Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-32149
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
security@golang.org | https://go.dev/cl/442235 | Vendor Advisory | |
security@golang.org | https://go.dev/issue/56152 | Issue Tracking, Third Party Advisory | |
security@golang.org | https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ | Mailing List, Third Party Advisory | |
security@golang.org | https://pkg.go.dev/vuln/GO-2022-1059 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/cl/442235 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://go.dev/issue/56152 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://pkg.go.dev/vuln/GO-2022-1059 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230203-0006/ |
Vendor | Product | Version | |
---|---|---|---|
▼ | golang.org/x/text | golang.org/x/text/language |
Version: 0 ≤ |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:32:56.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://security.netapp.com/advisory/ntap-20230203-0006/" }, { "tags": [ "x_transferred" ], "url": "https://go.dev/issue/56152" }, { "tags": [ "x_transferred" ], "url": "https://go.dev/cl/442235" }, { "tags": [ "x_transferred" ], "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "tags": [ "x_transferred" ], "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://pkg.go.dev", "defaultStatus": "unaffected", "packageName": "golang.org/x/text/language", "product": "golang.org/x/text/language", "programRoutines": [ { "name": "ParseAcceptLanguage" }, { "name": "MatchStrings" } ], "vendor": "golang.org/x/text", "versions": [ { "lessThan": "0.3.8", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "value": "Adam Korczynski (ADA Logics)" }, { "lang": "en", "value": "OSS-Fuzz" } ], "descriptions": [ { "lang": "en", "value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE 400: Uncontrolled Resource Consumption", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-06-12T19:12:44.090Z", "orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "shortName": "Go" }, "references": [ { "url": "https://go.dev/issue/56152" }, { "url": "https://go.dev/cl/442235" }, { "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ], "title": "Denial of service via crafted Accept-Language header in golang.org/x/text/language" } }, "cveMetadata": { "assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc", "assignerShortName": "Go", "cveId": "CVE-2022-32149", "datePublished": "2022-10-14T00:00:00", "dateReserved": "2022-05-31T00:00:00", "dateUpdated": "2024-08-03T07:32:56.022Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-32149\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2022-10-14T15:15:34.543\",\"lastModified\":\"2024-11-21T07:05:50.547\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.\"},{\"lang\":\"es\",\"value\":\"Un atacante podr\u00eda causar una denegaci\u00f3n de servicio al dise\u00f1ar un encabezado Accept-Language que ParseAcceptLanguage tardar\u00eda mucho tiempo en analizar\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-772\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"0.3.8\",\"matchCriteriaId\":\"B60E2667-B233-430C-8BD7-28CDFFB1469F\"}]}]}],\"references\":[{\"url\":\"https://go.dev/cl/442235\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/issue/56152\",\"source\":\"security@golang.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\",\"source\":\"security@golang.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2022-1059\",\"source\":\"security@golang.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/cl/442235\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://go.dev/issue/56152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://pkg.go.dev/vuln/GO-2022-1059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230203-0006/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2022_7407
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for service-binding-operator-bundle-container and service-binding-operator-container is now available for OpenShift Developer Tools and Services for OCP 4.9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Service Binding Operator 1.3.1 is now available for OpenShift Developer Tools and Services for OCP 4.9 +\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7407", "url": "https://access.redhat.com/errata/RHSA-2022:7407" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html", "url": "https://docs.openshift.com/container-platform/latest/applications/connecting_applications_to_services/odc-connecting-an-application-to-a-service-using-the-developer-perspective.html" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "APPSVC-1220", "url": "https://issues.redhat.com/browse/APPSVC-1220" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7407.json" } ], "title": "Red Hat Security Advisory: Service Binding Operator 1.3.1 security update", "tracking": { "current_release_date": "2024-12-17T22:05:23+00:00", "generator": { "date": "2024-12-17T22:05:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7407", "initial_release_date": "2022-11-03T13:32:17+00:00", "revision_history": [ { "date": "2022-11-03T13:32:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-03T13:32:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:05:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product": { "name": "OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9", "product_identification_helper": { "cpe": "cpe:/a:redhat:ocp_tools:4.9::el8" } } } ], "category": "product_family", "name": "OpenShift Jenkins" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "product": { "name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "product_id": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "product_identification_helper": { "purl": "pkg:oci/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-operator-bundle\u0026tag=v1.3.1-7" } } }, { "category": "product_version", "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "product": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "product_identification_helper": { "purl": "pkg:oci/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0?arch=amd64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "product": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "product_identification_helper": { "purl": "pkg:oci/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2?arch=arm64\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "product": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "product_identification_helper": { "purl": "pkg:oci/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959?arch=s390x\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le", "product": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le", "product_id": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le", "product_identification_helper": { "purl": "pkg:oci/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08?arch=ppc64le\u0026repository_url=registry.redhat.io/ocp-tools-4/service-binding-rhel8-operator\u0026tag=v1.3.1-5" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64" }, "product_reference": "ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "relates_to_product_reference": "8Base-OCP-Tools-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64" }, "product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "relates_to_product_reference": "8Base-OCP-Tools-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64 as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64" }, "product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "relates_to_product_reference": "8Base-OCP-Tools-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x" }, "product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "relates_to_product_reference": "8Base-OCP-Tools-4.9" }, { "category": "default_component_of", "full_product_name": { "name": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le as a component of OpenShift Developer Tools and Services for OCP 4.9 for RHEL 8", "product_id": "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le" }, "product_reference": "ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le", "relates_to_product_reference": "8Base-OCP-Tools-4.9" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-03T13:32:17+00:00", "details": "Before applying this update, ensure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, see: https://access.redhat.com/articles/11258.\n\nFollow the instructions linked in the References section to create service binding connections between applications and services using the Developer perspective in the OpenShift Container Platform web console.", "product_ids": [ "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7407" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-operator-bundle@sha256:ed577a367afc96253a125e8868dc992f832bbca209d7abe57fc939ed686715b6_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1640967bb2d7feb690921d81c5938d43e06a9794d8bd32f817fc8b5816d339d0_amd64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:1f14186b1fb24aebb5a706ab9560003fa57c595d37a65092a1443a0d0bf8e9c2_arm64", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:98f9de0d64607fc9a8dade067d12ba73bdae4006f7ef0571e628f7fcaecf8959_s390x", "8Base-OCP-Tools-4.9:ocp-tools-4/service-binding-rhel8-operator@sha256:eb70d8863ec16d3c78d72455c12ea121c52e485e812dd2903ef4c5b52ce78c08_ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2023_0692
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "OpenShift API for Data Protection (OADP) 1.0.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.\n\nSecurity Fix(es) from Bugzilla:\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0692", "url": "https://access.redhat.com/errata/RHSA-2023:0692" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "MIG-1050", "url": "https://issues.redhat.com/browse/MIG-1050" }, { "category": "external", "summary": "OADP-1180", "url": "https://issues.redhat.com/browse/OADP-1180" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0692.json" } ], "title": "Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.0.7 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:09:34+00:00", "generator": { "date": "2024-12-17T22:09:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:0692", "initial_release_date": "2023-02-09T01:07:26+00:00", "revision_history": [ { "date": "2023-02-09T01:07:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-02-09T01:07:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:09:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-OADP-1.0", "product": { "name": "8Base-OADP-1.0", "product_id": "8Base-OADP-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_api_data_protection:1.0::el8" } } } ], "category": "product_family", "name": "OpenShift API for Data Protection" }, { "branches": [ { "category": "product_version", "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "product": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "product_id": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-kubevirt-velero-plugin-rhel8\u0026tag=1.0.7-4" } } }, { "category": "product_version", "name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "product": { "name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "product_id": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-mustgather-rhel8\u0026tag=1.0.7-4" } } }, { "category": "product_version", "name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "product": { "name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "product_id": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-operator-bundle\u0026tag=1.0.7-8" } } }, { "category": "product_version", "name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "product": { "name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "product_id": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-rhel8-operator\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "product": { "name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "product_id": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-registry-rhel8\u0026tag=1.0.7-3" } } }, { "category": "product_version", "name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64", "product": { "name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64", "product_id": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-rhel8\u0026tag=1.0.7-5" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "product": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "product_id": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-rhel8\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "product_id": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-aws-rhel8\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "product_id": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-csi-rhel8\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "product_id": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-gcp-rhel8\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "product": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "product_id": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-plugin-for-microsoft-azure-rhel8\u0026tag=1.0.7-2" } } }, { "category": "product_version", "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "product": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "product_id": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "product_identification_helper": { "purl": "pkg:oci/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f?arch=amd64\u0026repository_url=registry.redhat.io/oadp/oadp-velero-restic-restore-helper-rhel8\u0026tag=1.0.7-5" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64" }, "product_reference": "oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64" }, "product_reference": "oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64" }, "product_reference": "oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64" }, "product_reference": "oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64" }, "product_reference": "oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64" }, "product_reference": "oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64" }, "product_reference": "oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64" }, "product_reference": "oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "relates_to_product_reference": "8Base-OADP-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64 as a component of 8Base-OADP-1.0", "product_id": "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" }, "product_reference": "oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64", "relates_to_product_reference": "8Base-OADP-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ], "known_not_affected": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T01:07:26+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0692" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64" ], "known_not_affected": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T01:07:26+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0692" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-OADP-1.0:oadp/oadp-kubevirt-velero-plugin-rhel8@sha256:3749d7386635cf598147d5021584672ab26761b9dca52ca05b179d47557ac549_amd64", "8Base-OADP-1.0:oadp/oadp-mustgather-rhel8@sha256:f269ee31bf0eb544ccabb2d72d807dc5d6587186d76bb020a00fac20221c7b0f_amd64", "8Base-OADP-1.0:oadp/oadp-operator-bundle@sha256:d0927b9f279ad60a073773ec624dc66db000b3d0b727254fbadb6af3a3c7b646_amd64", "8Base-OADP-1.0:oadp/oadp-registry-rhel8@sha256:ea215cbf22a37c2f2b77c9901dc5c7493f1f3a694276f42d11fcefbf045a8b38_amd64", "8Base-OADP-1.0:oadp/oadp-rhel8-operator@sha256:4d983585501df88bd5f602010cb72ea460982b25fa91c05a83f0b711a457661a_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-aws-rhel8@sha256:1792552893fe7f146f04033f342e9095f0068dd60e1f3a1e2dad9c5111dd28e6_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-csi-rhel8@sha256:aed05c3b1e7eee9054ee45b499e2eb31a534979468ba22be46f83459d0dab4ae_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-gcp-rhel8@sha256:82ebe14f59b19d628ecbe63a212ecaf4623a98a432b8b4525b118c6b24c87d90_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-for-microsoft-azure-rhel8@sha256:1200ba024b3301c4ea18817c81e06133a52bcc7565302ebf9aa4677080b64e56_amd64", "8Base-OADP-1.0:oadp/oadp-velero-plugin-rhel8@sha256:d9a46e3da52db4880cde8faa6f5e406039e6f38585dd14dc97db4b5846b4f7e5_amd64", "8Base-OADP-1.0:oadp/oadp-velero-restic-restore-helper-rhel8@sha256:9fda0732f74519e71a4f10f10b32a451f01c3bf9eae37f7bd1ff90ad8baf3a9f_amd64", "8Base-OADP-1.0:oadp/oadp-velero-rhel8@sha256:a5973be01956a09f75bcd65481d484c12fd7bcefad5b852fd0567f6d8b51f0be_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2023_3205
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 images.\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update also fixes several bugs and adds various enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3205", "url": "https://access.redhat.com/errata/RHSA-2023:3205" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2023393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023393" }, { "category": "external", "summary": "2029391", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029391" }, { "category": "external", "summary": "2052556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052556" }, { "category": "external", "summary": "2060499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060499" }, { "category": "external", "summary": "2070132", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070132" }, { "category": "external", "summary": "2087540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087540" }, { "category": "external", "summary": "2101390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2101390" }, { "category": "external", "summary": "2104424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104424" }, { "category": "external", "summary": "2104479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104479" }, { "category": "external", "summary": "2104859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104859" }, { "category": "external", "summary": "2110562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2110562" }, { "category": "external", "summary": "2111794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2111794" }, { "category": "external", "summary": "2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "2114922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2114922" }, { "category": "external", "summary": "2116562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2116562" }, { "category": "external", "summary": "2117803", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2117803" }, { "category": "external", "summary": "2122119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122119" }, { "category": "external", "summary": "2122168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2122168" }, { "category": "external", "summary": "2123209", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2123209" }, { "category": "external", "summary": "2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2132873", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132873" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2138199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138199" }, { "category": "external", "summary": "2138653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138653" }, { "category": "external", "summary": "2138664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2138664" }, { "category": "external", "summary": "2139235", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139235" }, { "category": "external", "summary": "2139257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139257" }, { "category": "external", "summary": "2139260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139260" }, { "category": "external", "summary": "2139293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139293" }, { "category": "external", "summary": "2139296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139296" }, { "category": "external", "summary": "2139299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139299" }, { "category": "external", "summary": "2139306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139306" }, { "category": "external", "summary": "2139479", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139479" }, { "category": "external", "summary": "2139574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139574" }, { "category": "external", "summary": "2139651", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139651" }, { "category": "external", "summary": "2139687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139687" }, { "category": "external", "summary": "2139820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2139820" }, { "category": "external", "summary": "2140730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140730" }, { "category": "external", "summary": "2140977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140977" }, { "category": "external", "summary": "2140982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140982" }, { "category": "external", "summary": "2140998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140998" }, { "category": "external", "summary": "2142511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142511" }, { "category": "external", "summary": "2143039", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143039" }, { "category": "external", "summary": "2143498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143498" }, { "category": "external", "summary": "2143716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2143716" }, { "category": "external", "summary": "2144580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144580" }, { "category": "external", "summary": "2145092", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145092" }, { "category": "external", "summary": "2145126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145126" }, { "category": "external", "summary": "2145137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145137" }, { "category": "external", "summary": "2145223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2145223" }, { "category": "external", "summary": "2147582", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2147582" }, { "category": "external", "summary": "2148322", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148322" }, { "category": "external", "summary": "2148849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148849" }, { "category": "external", "summary": "2148850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148850" }, { "category": "external", "summary": "2149118", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149118" }, { "category": "external", "summary": "2149201", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149201" }, { "category": "external", "summary": "2149227", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149227" }, { "category": "external", "summary": "2149897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2149897" }, { "category": "external", "summary": "2150364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150364" }, { "category": "external", "summary": "2150653", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150653" }, { "category": "external", "summary": "2150832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2150832" }, { "category": "external", "summary": "2151053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151053" }, { "category": "external", "summary": "2151056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151056" }, { "category": "external", "summary": "2151427", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151427" }, { "category": "external", "summary": "2151508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151508" }, { "category": "external", "summary": "2151521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151521" }, { "category": "external", "summary": "2151759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151759" }, { "category": "external", "summary": "2151766", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151766" }, { "category": "external", "summary": "2151831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151831" }, { "category": "external", "summary": "2152122", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152122" }, { "category": "external", "summary": "2152534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152534" }, { "category": "external", "summary": "2152537", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2152537" }, { "category": "external", "summary": "2155403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155403" }, { "category": "external", "summary": "2155409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155409" }, { "category": "external", "summary": "2155796", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2155796" }, { "category": "external", "summary": "2156392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156392" }, { "category": "external", "summary": "2156902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156902" }, { "category": "external", "summary": "2158060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158060" }, { "category": "external", "summary": "2158079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158079" }, { "category": "external", "summary": "2158362", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158362" }, { "category": "external", "summary": "2158424", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158424" }, { "category": "external", "summary": "2158515", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158515" }, { "category": "external", "summary": "2159715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159715" }, { "category": "external", "summary": "2159975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2159975" }, { "category": "external", "summary": "2160298", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160298" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "2161340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161340" }, { "category": "external", "summary": "2162016", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162016" }, { "category": "external", "summary": "2162333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2162333" }, { "category": "external", "summary": "2163460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2163460" }, { "category": "external", "summary": "2164590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164590" }, { "category": "external", "summary": "2164807", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164807" }, { "category": "external", "summary": "2164814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164814" }, { "category": "external", "summary": "2164838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164838" }, { "category": "external", "summary": "2165618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165618" }, { "category": "external", "summary": "2165943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165943" }, { "category": "external", "summary": "2166165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166165" }, { "category": "external", "summary": "2166394", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166394" }, { "category": "external", "summary": "2166507", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166507" }, { "category": "external", "summary": "2166508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166508" }, { "category": "external", "summary": "2166512", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2166512" }, { "category": "external", "summary": "2167012", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167012" }, { "category": "external", "summary": "2167226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167226" }, { "category": "external", "summary": "2167251", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167251" }, { "category": "external", "summary": "2167661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167661" }, { "category": "external", "summary": "2167979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167979" }, { "category": "external", "summary": "2168032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168032" }, { "category": "external", "summary": "2168111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168111" }, { "category": "external", "summary": "2168165", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168165" }, { "category": "external", "summary": "2168180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168180" }, { "category": "external", "summary": "2168480", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168480" }, { "category": "external", "summary": "2168484", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168484" }, { "category": "external", "summary": "2168486", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168486" }, { "category": "external", "summary": "2168488", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168488" }, { "category": "external", "summary": "2168561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168561" }, { "category": "external", "summary": "2168770", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168770" }, { "category": "external", "summary": "2168859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168859" }, { "category": "external", "summary": "2168861", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2168861" }, { "category": "external", "summary": "2169699", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169699" }, { "category": "external", "summary": "2169880", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169880" }, { "category": "external", "summary": "2170703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170703" }, { "category": "external", "summary": "2170740", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2170740" }, { "category": "external", "summary": "2171395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2171395" }, { "category": "external", "summary": "2172371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172371" }, { "category": "external", "summary": "2172375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172375" }, { "category": "external", "summary": "2172612", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172612" }, { "category": "external", "summary": "2172842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172842" }, { "category": "external", "summary": "2172952", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2172952" }, { "category": "external", "summary": "2173527", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173527" }, { "category": "external", "summary": "2173562", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173562" }, { "category": "external", "summary": "2173563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173563" }, { "category": "external", "summary": "2173593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173593" }, { "category": "external", "summary": "2173595", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2173595" }, { "category": "external", "summary": "2174288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174288" }, { "category": "external", "summary": "2174324", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174324" }, { "category": "external", "summary": "2174334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174334" }, { "category": "external", "summary": "2174619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174619" }, { "category": "external", "summary": "2174636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174636" }, { "category": "external", "summary": "2174742", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2174742" }, { "category": "external", "summary": "2175054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175054" }, { "category": "external", "summary": "2175171", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175171" }, { "category": "external", "summary": "2175256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175256" }, { "category": "external", "summary": "2175274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175274" }, { "category": "external", "summary": "2175571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175571" }, { "category": "external", "summary": "2175601", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175601" }, { "category": "external", "summary": "2175636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175636" }, { "category": "external", "summary": "2175641", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175641" }, { "category": "external", "summary": "2175643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175643" }, { "category": "external", "summary": "2175888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175888" }, { "category": "external", "summary": "2175890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175890" }, { "category": "external", "summary": "2175974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175974" }, { "category": "external", "summary": "2175976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175976" }, { "category": "external", "summary": "2175977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175977" }, { "category": "external", "summary": "2175979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175979" }, { "category": "external", "summary": "2175983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175983" }, { "category": "external", "summary": "2175985", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175985" }, { "category": "external", "summary": "2175986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175986" }, { "category": "external", "summary": "2175988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175988" }, { "category": "external", "summary": "2176353", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176353" }, { "category": "external", "summary": "2176355", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176355" }, { "category": "external", "summary": "2176422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176422" }, { "category": "external", "summary": "2176706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176706" }, { "category": "external", "summary": "2176708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176708" }, { "category": "external", "summary": "2176725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176725" }, { "category": "external", "summary": "2176753", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176753" }, { "category": "external", "summary": "2176804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176804" }, { "category": "external", "summary": "2176843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176843" }, { "category": "external", "summary": "2177091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177091" }, { "category": "external", "summary": "2177578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177578" }, { "category": "external", "summary": "2177586", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177586" }, { "category": "external", "summary": "2177589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177589" }, { "category": "external", "summary": "2177668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177668" }, { "category": "external", "summary": "2177763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177763" }, { "category": "external", "summary": "2177888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177888" }, { "category": "external", "summary": "2177961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177961" }, { "category": "external", "summary": "2177973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2177973" }, { "category": "external", "summary": "2178037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178037" }, { "category": "external", "summary": "2178628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178628" }, { "category": "external", "summary": "2178629", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2178629" }, { "category": "external", "summary": "2179225", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179225" }, { "category": "external", "summary": "2179226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179226" }, { "category": "external", "summary": "2179565", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179565" }, { "category": "external", "summary": "2179626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179626" }, { "category": "external", "summary": "2179811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179811" }, { "category": "external", "summary": "2180146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180146" }, { "category": "external", "summary": "2180279", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180279" }, { "category": "external", "summary": "2180553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180553" }, { "category": "external", "summary": "2180853", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180853" }, { "category": "external", "summary": "2182006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182006" }, { "category": "external", "summary": "2182097", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182097" }, { "category": "external", "summary": "2182534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182534" }, { "category": "external", "summary": "2182535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182535" }, { "category": "external", "summary": "2182536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182536" }, { "category": "external", "summary": "2182538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182538" }, { "category": "external", "summary": "2182539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182539" }, { "category": "external", "summary": "2182661", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182661" }, { "category": "external", "summary": "2183026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183026" }, { "category": "external", "summary": "2183205", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183205" }, { "category": "external", "summary": "2183397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183397" }, { "category": "external", "summary": "2183968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2183968" }, { "category": "external", "summary": "2186767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2186767" }, { "category": "external", "summary": "2187437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187437" }, { "category": "external", "summary": "2187547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187547" }, { "category": "external", "summary": "2187581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187581" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3205.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 Images security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-12-17T22:19:14+00:00", "generator": { "date": "2024-12-17T22:19:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3205", "initial_release_date": "2023-05-18T02:55:08+00:00", "revision_history": [ { "date": "2023-05-18T02:55:08+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-18T02:55:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:19:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.13 for RHEL 9", "product": { "name": "CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57?arch=amd64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "product": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "product_id": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "product_identification_helper": { "purl": "pkg:oci/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/bridge-marker-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "product": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "product_id": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cluster-network-addons-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "product": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "product_id": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-containernetworking-plugins-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "product": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "product_id": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "product_identification_helper": { "purl": "pkg:oci/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/cnv-must-gather-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "product": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "product_id": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "product_identification_helper": { "purl": "pkg:oci/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hco-bundle-registry-rhel9\u0026tag=v4.13.0.rhel9--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "product": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "product_id": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-csi-driver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-operator-rhel9\u0026tag=v4.13.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "product": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "product_id": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "product_identification_helper": { "purl": "pkg:oci/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hostpath-provisioner-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "product": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "product_id": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "product_identification_helper": { "purl": "pkg:oci/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/hyperconverged-cluster-webhook-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "product": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "product_id": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "product_identification_helper": { "purl": "pkg:oci/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubemacpool-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "product": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "product_id": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "product_identification_helper": { "purl": "pkg:oci/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubesecondarydns-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "product": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "product_id": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-console-plugin-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "product": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "product_id": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-dpdk-checkup-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "product": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "product_id": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-ssp-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "product": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "product_id": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "product": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "product_id": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "product_identification_helper": { "purl": "pkg:oci/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/kubevirt-template-validator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "product": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "product_id": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "product_identification_helper": { "purl": "pkg:oci/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/libguestfs-tools-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "product": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "product_id": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "product_identification_helper": { "purl": "pkg:oci/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/multus-dynamic-networks-rhel9\u0026tag=v4.13.0-37" } } }, { "category": "product_version", "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "product": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "product_id": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "product_identification_helper": { "purl": "pkg:oci/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/ovs-cni-plugin-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "product": { "name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "product_id": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-api-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "product": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "product_id": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-artifacts-server-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "product": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "product_id": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-apiserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "product": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "product_id": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-cloner-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "product": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "product_id": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-controller-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "product": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "product_id": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-importer-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "product": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "product_id": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadproxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "product": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "product_id": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-cdi-uploadserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "product": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "product_id": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-controller-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "product": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "product_id": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportproxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "product": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "product_id": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-exportserver-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "product": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "product_id": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-handler-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "product": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "product_id": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "product_identification_helper": { "purl": "pkg:oci/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virtio-win-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "product": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "product_id": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-launcher-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "product": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "product_id": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "product_identification_helper": { "purl": "pkg:oci/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/virt-operator-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "product": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "product_id": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-console-proxy-rhel9\u0026tag=v4.13.0--2022-101182" } } }, { "category": "product_version", "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "product": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "product_id": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "product_identification_helper": { "purl": "pkg:oci/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70?arch=arm64\u0026repository_url=registry.redhat.io/container-native-virtualization/vm-network-latency-checkup-rhel9\u0026tag=v4.13.0--2022-101182" } } } ], "category": "architecture", "name": "arm64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64" }, "product_reference": "container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64" }, "product_reference": "container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64" }, "product_reference": "container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64" }, "product_reference": "container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64" }, "product_reference": "container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64" }, "product_reference": "container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64" }, "product_reference": "container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64" }, "product_reference": "container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64" }, "product_reference": "container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64" }, "product_reference": "container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64" }, "product_reference": "container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64" }, "product_reference": "container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64" }, "product_reference": "container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64" }, "product_reference": "container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64" }, "product_reference": "container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64" }, "product_reference": "container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64" }, "product_reference": "container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64" }, "product_reference": "container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" }, "product_reference": "container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64" }, "product_reference": "container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64" }, "product_reference": "container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64" }, "product_reference": "container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64" }, "product_reference": "container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64" }, "product_reference": "container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64" }, "product_reference": "container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64" }, "product_reference": "container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64" }, "product_reference": "container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64" }, "product_reference": "container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64" }, "product_reference": "container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" }, "product_reference": "container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64", "relates_to_product_reference": "9Base-CNV-4.13" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "known_not_affected": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "known_not_affected": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-32189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2113814" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "known_not_affected": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32189" }, { "category": "external", "summary": "RHBZ#2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189" }, { "category": "external", "summary": "https://go.dev/issue/53871", "url": "https://go.dev/issue/53871" }, { "category": "external", "summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", "url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU" } ], "release_date": "2022-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service" }, { "cve": "CVE-2022-32190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124668" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "known_not_affected": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32190" }, { "category": "external", "summary": "RHBZ#2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190" }, { "category": "external", "summary": "https://go.dev/issue/54385", "url": "https://go.dev/issue/54385" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T02:55:08+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3205" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:8eac196b30a648989cdca5cb153a3bc3d34e47339acba0e4f760bd366496c99d_amd64", "9Base-CNV-4.13:container-native-virtualization/bridge-marker-rhel9@sha256:e8a55aee3d75a316bb0d7a554c737198823df04b3c05e481c17e45eb2153bced_arm64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:3bff33e3f40cd1e2b519c2db56734d4bb8df883e155c2f20b1cb9d3d184daec1_amd64", "9Base-CNV-4.13:container-native-virtualization/cluster-network-addons-operator-rhel9@sha256:f439d2f420bb59eb1d5af14ce2002648d0cfc155d1a1466c8aac9b661fe902b8_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:89f22e541f61a660c9aa9f38ef58e80b84a0517f74e84292107fc252c25465c9_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-containernetworking-plugins-rhel9@sha256:bf471997e54e4a75b0d71f492ab295787fdbb14d8c85c4ea8c03f0552dbc3755_amd64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:9e8efd76924958eb605401abdac08eba97fb83a1ada383bc87a7fb7c87b3a455_arm64", "9Base-CNV-4.13:container-native-virtualization/cnv-must-gather-rhel9@sha256:b9fc32b5fabedd65a4c3a471879c808af2087277de4278adaa115a732f0468da_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:60e89d7a99ff9f20e974430b802dd724a3bb6fa1e01e5a62daad98ac487b3063_amd64", "9Base-CNV-4.13:container-native-virtualization/hco-bundle-registry-rhel9@sha256:dd20b138045ef1424d83a47e7abcfcbb2ac54577dcec5ed3c186390aaa4c9d84_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:61e2824853d51347593ad909a5e546cd92e4216d6a1df5dffb50dd9cba277cce_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-csi-driver-rhel9@sha256:676d4c23a5f60dd331728af056b0a6b2d3358ac88da23299b1a98dfaca8f288e_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:515be94be496c67f5b8fd5f4832fe4385e56476e6589897d6b9fbb9bb2b00f32_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-operator-rhel9@sha256:571ae805641dea11646028c946039983c7fd82f138b915dcb8b80c39b465e63c_arm64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:ac3fe350bedd6bc43596444ba0f279ccf8a144ab14ac5a9b80ea71c46390b7b4_amd64", "9Base-CNV-4.13:container-native-virtualization/hostpath-provisioner-rhel9@sha256:d4ed87745b7ee2acca2d83e2c91c2f6dced1903c81495b50f2559b3ba2dde287_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e5ab9f3be59d3568e3d672ab374efb16990ccf92192eac4e1244b10fcd7423e2_amd64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-operator-rhel9@sha256:e681560b184189df03fc84c8a712f32289f42573dd348cda394b19565eb6eca8_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:06d036d320b3027bb8370bb8e0f6fe8c9f0ec9bca7aac3b5c53698ba4a170042_arm64", "9Base-CNV-4.13:container-native-virtualization/hyperconverged-cluster-webhook-rhel9@sha256:b5a01336180aad017df62cf8e652f2491b8263ba7e4dd07f858db1ef1924cf2f_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:4d190d81eeb3fbe9ed56cf3548dc83a3f81641bfdafa7b42dcfb0d2512566644_amd64", "9Base-CNV-4.13:container-native-virtualization/kubemacpool-rhel9@sha256:59862a59854f0d5b83dc25ba119f9586a8aff42b6e60d1922f8ae7b4567309ff_arm64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:121d30d78cc57731ea2242ef2c32430890ac66c2723e65608d5e2f26c3f515cd_amd64", "9Base-CNV-4.13:container-native-virtualization/kubesecondarydns-rhel9@sha256:b1838f3c8ba3d8113bddea17b78c21e1c1490e2a4a07ea77014edee523d06347_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:86a4b1e3d6ad1d56302c9c058f8bc5826dcfe6c46fb3e0ddaa06818645039020_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-console-plugin-rhel9@sha256:ffb2acd9ae09c1ef9ca756f5eaf6087d0a3957cfc824543949d25f556a97744d_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:525aceb9396010ebcdba14040f267889b807cd84db8e5b4030429b51f0fbf5fe_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-dpdk-checkup-rhel9@sha256:553c4686f56c66cc1e3c5ad9d4051f139d43f821eac3abb98ca5cdb8b5dfe202_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:901e6cad9534c7bd7c4018c60bccfe49d7280fba5a9901ab4c4d15e9345288c4_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-ssp-operator-rhel9@sha256:badeb0f65f543b209f6af761729d9778b7b73b97d55044016dfba3f38a1f6f18_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:28e4975fa4dac22d9da32ed2a10aed039fd957b30140daa36bab2caa998be77a_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-cleanup-vm-rhel9@sha256:b0ff7e812a576ea848590655fc13a85832d5a39f68e7769ceab9da6949da88c7_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:4916a6c6b1f9b529187d3b4d5fc99b90157993767b3fe2ad36a9ec77fbb46b10_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-copy-template-rhel9@sha256:f71c36442f1b61cdde7ec58d2c3c78d2039f6d6108e6c35388ef7c1650971fa1_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:2ad49cf6e2242a9e5861929d9bcab1305a7fc4e34e708f99cff1d7253aa46167_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-datavolume-rhel9@sha256:7112400a4ecb23ee2110bf96372fcf9f96ad648a51aa944627b40eb59539a660_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:1411c65bbad7302710788327f6964a4bf5bc20ef70d5e46f4a5c6e7a0e7a0161_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-create-vm-from-template-rhel9@sha256:4d962618aa95600c60c9fc8b890186e510de91177d51949e12797a3558e31328_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:5c23d3f20ea9dcbe7109284d73078ecd516a070e964b844f8d80b1d92ebd55ee_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-customize-rhel9@sha256:a780244e48c6d4f87446d3754c3eb9ab79c0d54675c189da4a659f7a4d5668ea_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:84577d949a1bbcaa291c70729127bca4a8994df03068666baa23840877ea8392_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-disk-virt-sysprep-rhel9@sha256:aed630a597a090179e1b0e0c117e536df06b67d0f793f91936aa7388c0c5d7eb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:31d959b80cf57462e1705684bb7e1b78af26bd2c62f1c9e4e51e1d02199b05a8_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-modify-vm-template-rhel9@sha256:66aea526bc10e4c0136ba86e394bbdfe4fbd7f757d6f391a561b51d2ba2f4d46_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:d0cf0e81589f0938de45961eaddfc5ec4782738fd11082de0439b200534259eb_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-operator-rhel9@sha256:f1b1f5044db6bb945584f9d4f31d020597725a286ef368ed0aca2116abb31beb_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:39a15d03f113735df03b1a7408227eb9604d942c1f3c1992bcdc7eaf07662711_amd64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-tekton-tasks-wait-for-vmi-status-rhel9@sha256:afb68af076954fcd18c7a4a1464ea0c2a766e8282eae980051906ed07eaa1707_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:02b22c7e7014b5e72d47fed8b6a268cf307638c5510adf3916c51f7f40a52a08_arm64", "9Base-CNV-4.13:container-native-virtualization/kubevirt-template-validator-rhel9@sha256:c0264b9271e602f85b2040ef7f207cdfa46038dc4fa6e4738bf196ef88a71cf8_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:29ae84575bbca24553cf649256759fd96ff286971d80bc2db129154a7df9b283_amd64", "9Base-CNV-4.13:container-native-virtualization/libguestfs-tools-rhel9@sha256:6558f60343e068b032167e2340b2c549c5f0258acc5d2614b60966ce79408b01_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:3ecb0162a4b01d1590bf209d717b32a4f0835910d9979823f18c24acba41b503_arm64", "9Base-CNV-4.13:container-native-virtualization/multus-dynamic-networks-rhel9@sha256:b7f68b6420009e21380d32d6459193aae45e93be9533debe17cb3108571b36b8_amd64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:0f1d372f418744e0aff59ecb0a38f53178aac9c2e9eecfd38aa25ed83e0d1360_arm64", "9Base-CNV-4.13:container-native-virtualization/ovs-cni-plugin-rhel9@sha256:e8e7a44edbf1713fe74de5c4b8f691cce78f4440c4a32a16ba9ad16694a55396_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:e68416321ca8c74a547b3d35897f54813c03481143e402e9bdc4daf315e35b5d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-api-rhel9@sha256:fdb4ca1bb8b310d713d9c7e88f7d091f4460aa942dbeca5ebcf17281a06daffe_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:33d11c1832b49df39c1fca62bad40dbc5c30a452248339aaef449ac99509accb_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-artifacts-server-rhel9@sha256:81fc61b714baecb5a89fa6c0749c14566e0661b8e184ca602fc2e03b9cf431ee_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:f6128a63344ed2129f5bce648ddcfaa2869d31cde4b93328d3c22534b97ade10_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-apiserver-rhel9@sha256:feca273a691d09445c6cff6d36b5d590735e867656a9898ce0d89744d98e8006_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:68e3b9b0291b4fb277ac430269ffce11d13b0a7688cf2ffcdb7f98759c36b4db_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-cloner-rhel9@sha256:6ac212767481bef64d8a7d0252bb8089c0f9751fad4a355aef71bd49dad2ad07_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:65f5263275d9f0a12b8fb057d82adf678778039ec873ca9bde182dea3413c9f1_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-controller-rhel9@sha256:d9e62b2019328be258489ac852eef25f8b1233f29abac6bcea5b406329f97fed_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:00a6d9d24ca1466d450b02269ec3144fc7550f0e5c696e869fbf7ce10cae6093_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-importer-rhel9@sha256:2df07fb21a3575e74aa16ded20129828f2300cd33e8ab369b0362062d49e62d0_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:20ec064750faedd97d11b797c8c1d9a1db5d60d7d76e82e65cfd05eb79d65e29_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-operator-rhel9@sha256:802ee8923d9d8e406b23911406f9748756c0ef4d6954e9e2fd5fb4bdf91dde9a_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:392d0f61f462c707adfdc21e4239c5c09d8520a80486b41d9d9ae479267d6124_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadproxy-rhel9@sha256:6775f34353eec8f35bead9411dde155530d079bb8d51582fb1f2aacc27dbde1d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:4528c24672689cfb6505761b6b108fbcc04488192733f23d2bfe39cd42a1d743_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-cdi-uploadserver-rhel9@sha256:b22048390387380af94e267c8a9a66813c515997456d59d8ebac1486916b6585_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:3e7880149ee9a68286e390beb3d9779f7403c30fc5136e5370e0e4690a3fd243_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-controller-rhel9@sha256:970edc281d7a731e9f7e8c2d4440fe48a221e5e355d5235c5413b4c3adb28503_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:1bda34d5bff734ad997202f29a5ff6f7362fd79fa90511a422442ef2e3681198_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-exportproxy-rhel9@sha256:de3c4afbf7669b98517cbef2490ec186f0553dd97b05bed80ec36dd883fe507b_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:3f7f98645176d42c63cca5c0fc3182a03121af87446ca421b6c72baf07dfca0d_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-exportserver-rhel9@sha256:8f12955cd777eb2409037a6968aa92f50c99d6e07e722951dbcfd0c8c9829b5e_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:5fc47110d866d8048aec50689090ce10705d19d3bb48d2b06727d6d569003af7_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-handler-rhel9@sha256:84ba79ae9658699147d2493df2582ab6df10adbff4d44a533c3fe6a9f45f9691_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:4990d40d9987d5126d105dd45be2501eaded248cb61bdde5ea8d359bc1e7ebef_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-launcher-rhel9@sha256:95aeacb98209e0baef27ce0e02fbac38d693cea74808fc77107efda0f344bcb5_arm64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:5c1a7e4ed2061938987b900a2394f07121d4037350c9bb6485213a2adfea787d_amd64", "9Base-CNV-4.13:container-native-virtualization/virt-operator-rhel9@sha256:66b1b3b379121d6411ba22283e7d991617177330c93746d37753ab7812b9a00b_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:8735f51da918408a8826601c082d1b29accf26d59b9978da89b980cb509c1102_arm64", "9Base-CNV-4.13:container-native-virtualization/virtio-win-rhel9@sha256:d147d2a6eb6f907d1e88f61aaca83596853bc72164583d6dda2b1154b490de25_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:70a8d0cd66182c25e02679540bae1368b2a9cf687532b58dba41ef30c5ca00c1_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-console-proxy-rhel9@sha256:7ca921f98f6d81a126907127a611146fb53397869a628678faa1e289c01d22b2_amd64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:503ea7ac914a9b54e9d665a0227ee0b5d5200cdb5d692aa94c07dd1518d91b70_arm64", "9Base-CNV-4.13:container-native-virtualization/vm-network-latency-checkup-rhel9@sha256:59fd965975bccf641a0fa7aa01374d45057bd03cda7528248a84b60b1205bf57_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2022_7434
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Logging Subsystem 5.5.4 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7434", "url": "https://access.redhat.com/errata/RHSA-2022:7434" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "LOG-2674", "url": "https://issues.redhat.com/browse/LOG-2674" }, { "category": "external", "summary": "LOG-3042", "url": "https://issues.redhat.com/browse/LOG-3042" }, { "category": "external", "summary": "LOG-3049", "url": "https://issues.redhat.com/browse/LOG-3049" }, { "category": "external", "summary": "LOG-3127", "url": "https://issues.redhat.com/browse/LOG-3127" }, { "category": "external", "summary": "LOG-3138", "url": "https://issues.redhat.com/browse/LOG-3138" }, { "category": "external", "summary": "LOG-3175", "url": "https://issues.redhat.com/browse/LOG-3175" }, { "category": "external", "summary": "LOG-3213", "url": "https://issues.redhat.com/browse/LOG-3213" }, { "category": "external", "summary": "LOG-3234", "url": "https://issues.redhat.com/browse/LOG-3234" }, { "category": "external", "summary": "LOG-3251", "url": "https://issues.redhat.com/browse/LOG-3251" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7434.json" } ], "title": "Red Hat Security Advisory: Logging Subsystem 5.5.4 - Red Hat OpenShift security update", "tracking": { "current_release_date": "2024-12-17T22:05:24+00:00", "generator": { "date": "2024-12-17T22:05:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7434", "initial_release_date": "2022-11-10T03:50:23+00:00", "revision_history": [ { "date": "2022-11-10T03:50:23+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-10T03:50:23+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:05:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOL 5.5 for RHEL 8", "product": { "name": "RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:5.5::el8" } } } ], "category": "product_family", "name": "logging for Red Hat OpenShift" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "product_id": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "product_id": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "product_id": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "product": { "name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "product_id": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34" } } }, { "category": "product_version", "name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "product": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "product_id": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "product_id": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "product_id": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "product_id": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "product_id": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "product": { "name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "product_id": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34" } } }, { "category": "product_version", "name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "product": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "product_id": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.5.4-13" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "product": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.5.4-17" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "product_id": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "product_id": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "product_id": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "product": { "name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "product_id": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34" } } }, { "category": "product_version", "name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "product": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2" } } }, { "category": "product_version", "name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "product": { "name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "product_id": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.5.4-18" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "product_id": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.5.4-7" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.5.4-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-303" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-71" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-245" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-264" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "product_id": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-52" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "product_id": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.6-61" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "product_id": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-301" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "product_id": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.6.1-21" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x", "product": { "name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x", "product_id": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.21.0-34" } } }, { "category": "product_version", "name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "product": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "product_id": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-view-plugin-rhel8\u0026tag=v5.5.4-2" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "product_id": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.5.4-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v0.1.0-57" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v0.1.0-27" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64" }, "product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64" }, "product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64" }, "product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le" }, "product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x" }, "product_reference": "openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64" }, "product_reference": "openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64" }, "product_reference": "openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64 as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64" }, "product_reference": "openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le" }, "product_reference": "openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.5" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x as a component of RHOL 5.5 for RHEL 8", "product_id": "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x" }, "product_reference": "openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x", "relates_to_product_reference": "8Base-RHOL-5.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64" ], "known_not_affected": [ "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-10T03:50:23+00:00", "details": "For OpenShift Container Platform 4.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.openshift.com/container-platform/4.11/release_notes/ocp-4-11-release-notes.html\n\nFor Red Hat OpenShift Logging 5.5, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.11/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7434" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOL-5.5:openshift-logging/cluster-logging-operator-bundle@sha256:a78fd59207ef6cc8ddaaa3f3ae7140b7678e96e0677517623d1537afc05e84dd_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:07ab076aa9b573d330ace59bf4de080ea64dbc7b3424357fc39c0c70ede27873_arm64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:11c10388503a708a962e3dfc5cdd9b6ad5c5d4d4a68b11f97f8fae2cc3884083_s390x", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:414649f77a20e04b3eb16d64acf81a4d261394016d4a890da309cbb8216c1d4a_amd64", "8Base-RHOL-5.5:openshift-logging/cluster-logging-rhel8-operator@sha256:b4eeab42904e5a81e7adb8801bd901a53a5b81b2464b33816c203daf7587f89f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-operator-bundle@sha256:d09cafc7f6bbb446608051cebb1c943575e80f9987bb4cad8af53e0354a0e7cd_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:89f980b63cbcf7956449d8cee41c884ea4ae7d76f02454f7e32058576fd92fa5_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:a6c03fd0fe66206bff59ba019cc60085de4c65d4efae8a637f1ac48b91688371_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:dcdd0c515b3b5a1a6e807929fb8e8d65c1ee2aba3bf696d2b9f852e8994e47b8_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-proxy-rhel8@sha256:e1755002225548182e17bd82b1c129b2ac61e623c3c37c4d51a535012088cacc_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:5236634419119024d3f8779dbd78639a54c2323389f56fbf25dacdc499a072d3_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:64954ce7d233d6c109e46645cd8d55d8a06068328ce3a22f646ede7c9fde78c8_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:c25b7b7c0f073fdfcf9fd90572790064cdff26d61a4e4db751d4197ff2c5b4c1_amd64", "8Base-RHOL-5.5:openshift-logging/elasticsearch-rhel8-operator@sha256:dce08ac53092fc51958b78df9b4b870926a079fe4cdc4fb2d46c8ba545a22e6a_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:1019e03ddff4726caae53e800403cbaa82ce057c7553552ad027a37d3be5824f_ppc64le", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:6dfb5e18aa3dc6ce8e2535e13de1d53eea68b218854971e0eb594f677f6da7c7_arm64", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:7c143b790fef75a04e8ed1be49576861651f66371355a3f5aa304a325faf6e5c_s390x", "8Base-RHOL-5.5:openshift-logging/elasticsearch6-rhel8@sha256:bf574cff65baba457e3199aae7d1b0e605403a7968e9af746a6cfc5d9a4b29c5_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:0590711175be3b10f646256407cb7d72df63333589d527199260f738a91f2e3d_arm64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:646995416047cf48070c60b9ab064d454ff9ed772a92558f9627e3832f0ccd3c_amd64", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:ac91af413a363890bb01772488e371e4dc698ecfb77f047bb83bf638d497aa7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/eventrouter-rhel8@sha256:eaf322aeccc73ec9d8d5f5a9d6ee368ee3f68409031e18a60cc699e3ca5c144b_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:3d4b83f86b2d2f1c73ab184a3471d0d4da04bb6e76487c9f546da87998e480dc_arm64", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:490740ea41377e7d18ffba700a5022915edc13f6b38f86a6d9d475dfc61df935_s390x", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:790fe2b90b51f8aff5d10b1525bcf7d35e5517674245993dac6696ebf2a24baf_ppc64le", "8Base-RHOL-5.5:openshift-logging/fluentd-rhel8@sha256:dc8fe0ca5a488c6738e6904871a620f9444f30475863a09846f8205569c25e54_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:43e4da1a741543ac8cdf646901aff3185e5f30d6fad7e68a2233e2bd8d4ebe4b_s390x", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:44f3446b172b3ea7f0fd4de9f8039eba256a6bea56715748af00f361e49b1519_amd64", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:93c33d6810eb6e71e7e543c1c26a29e163214df64121c814b4424322308b0a30_ppc64le", "8Base-RHOL-5.5:openshift-logging/kibana6-rhel8@sha256:ca4f273fb088980bfcc3607bd7ea2d40cc93298262cb3f5ce4054a6235152d1e_arm64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:44e17bbdb8c7ac0a7868b3be7e29d58401702384dab3a66efaa08d1176035672_s390x", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:8b76243469011045e72b7a339288986e7561a3005aa94d580d5b1082580e9cec_ppc64le", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:e91d4b026d38091cb707e0213f329d0781a3517f3eca4d209d09d6c1edb1a1d3_amd64", "8Base-RHOL-5.5:openshift-logging/log-file-metric-exporter-rhel8@sha256:f0ca78341daa3d41ffe460f5aa504219c72ee673dd57a82f344d3239b69717be_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:6f17fc02901a898b77c674cd4ba1764423e849c5faa888b2907ff7356accc66c_s390x", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:c8ea484f5e15b7b53941f251db9b5be08c8cb6f3a14d99285277d9eadf969e98_arm64", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e26efb87488b53ebd4e5233515906974675b3a759f4a1c00f447df8821d5f030_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-curator5-rhel8@sha256:e6ae5eef57de608fb1d4393fe824d0befffd8f5b696b5ce44e571fdcddb46f1f_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:6242c3792c8c0469012be8b0140c2476e41f80b5271ba78ff42c63aa041be30f_s390x", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:947becc46b99656f9faa6067f2cf38dbef0d40e85b56d62aafcb243052920dfc_amd64", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:969ce1d586fb7fbdd65d07c0b790f48fd6f81e659d1323514906bb03ae9fe79b_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-loki-rhel8@sha256:dd5e5a043befc54eeb63ff51a01691778053c90de5c9b8946d6a1d808fbcf0df_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:147676e1a3c66757508be0046c28ccb7985f15af7f8f4a045fa5ca424c0c684d_arm64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:bea8f3f31073874a77af55c8664cbf167cd8bad5296e1bf444b9490b06484b56_amd64", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:da8c90c5b3b68e9b98a76828a450a9d7c579256b04aa9daf87ddfab9bad5548c_ppc64le", "8Base-RHOL-5.5:openshift-logging/logging-view-plugin-rhel8@sha256:e3e5b570f9c819cb10ad38e928a301e8f0554e45052037b03f1ba81a3faa6a15_s390x", "8Base-RHOL-5.5:openshift-logging/loki-operator-bundle@sha256:1d75006c9d03648857963a8772644d4228361d97fb07c8652326b61fd5d30f8c_amd64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:43fae2b6532712da7d0f83b5dda5797c9764fcac4b0e18580a19e54ee7dfcff6_s390x", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:4eba6362f8aaa0450d07b87824148d2c15232b871d0ba6bc34f1962d2970e753_ppc64le", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:dfa4ca06abb576fa071fb30c425bc6be631c0453939de562e1dc0b4e76de4f81_arm64", "8Base-RHOL-5.5:openshift-logging/loki-rhel8-operator@sha256:e5289e40532a01c605760b2f438acfb66257b730a89249269e46dc9c0058aec1_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:0a3eb7a1a50b75528be737eb2768e671a643eea324c967a0381296b61f8e399e_arm64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:42ebf89821e0f8e4b7d03cc5a6d5a30d48f73a1ab2b7486c8a0bb1e5c2cfd4b4_ppc64le", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:449f4cf0b3d0c0d6724cc2346c2121df58ef43297c56cc540e05158ad5c8ffbc_amd64", "8Base-RHOL-5.5:openshift-logging/lokistack-gateway-rhel8@sha256:5954a498e527ee59a3f655250a4f5535a26b49c6fd61889271affb08104839f8_s390x", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:4c1b37da97e80aa76f2612f34745180a026214a415ed9a186ab81ec8fa96e17d_amd64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:847c70de5af59c9aec366612a74477de931977cf79d5f9ed117772e931589497_ppc64le", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:c8458b60077d018eaa78f38fc0b85786d8108b88faea6e420cc01b720f23af48_arm64", "8Base-RHOL-5.5:openshift-logging/opa-openshift-rhel8@sha256:fc99739f4354e8b28613f50b441d3f7a93bea3e3b106d7c052b607c24b994b9e_s390x", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c237605a0062e69e10a1fad47375f9c51dbccb110e1d11a02f2b7101d611e8f_amd64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:6c8b9e91e4d527bc0694879c7ce908e3d67877fd53191b71af95191cc0149afa_arm64", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:b22fe4e184b908986301fda4d2b57f4b9b91149168386a8d9c7ac9b0c4631c7c_ppc64le", "8Base-RHOL-5.5:openshift-logging/vector-rhel8@sha256:c117a0024d06340a9a28686c144642d6591192738f263f4684a7d09af0b16c71_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2023_3204
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Virtualization release 4.13.0 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Virtualization is Red Hat\u0027s virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains OpenShift Virtualization 4.13.0 RPMs.\n\nSecurity Fix(es):\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* 4.13.0 rpms (BZ#2124993)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3204", "url": "https://access.redhat.com/errata/RHSA-2023:3204" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2124993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124993" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3204.json" } ], "title": "Red Hat Security Advisory: OpenShift Virtualization 4.13.0 RPMs security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:19:05+00:00", "generator": { "date": "2024-12-17T22:19:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3204", "initial_release_date": "2023-05-18T00:39:12+00:00", "revision_history": [ { "date": "2023-05-18T00:39:12+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-05-18T00:39:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:19:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "CNV 4.13 for RHEL 9", "product": { "name": "CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el9" } } }, { "category": "product_name", "name": "CNV 4.13 for RHEL 7", "product": { "name": "CNV 4.13 for RHEL 7", "product_id": "7Server-CNV-4.13", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el7" } } }, { "category": "product_name", "name": "CNV 4.13 for RHEL 8", "product": { "name": "CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13", "product_identification_helper": { "cpe": "cpe:/a:redhat:container_native_virtualization:4.13::el8" } } } ], "category": "product_family", "name": "OpenShift Virtualization" }, { "branches": [ { "category": "product_version", "name": "kubevirt-0:4.13.0-1469.el9.src", "product": { "name": "kubevirt-0:4.13.0-1469.el9.src", "product_id": "kubevirt-0:4.13.0-1469.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el9?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:4.13.0-1469.el7.src", "product": { "name": "kubevirt-0:4.13.0-1469.el7.src", "product_id": "kubevirt-0:4.13.0-1469.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el7?arch=src" } } }, { "category": "product_version", "name": "kubevirt-0:4.13.0-1469.el8.src", "product": { "name": "kubevirt-0:4.13.0-1469.el8.src", "product_id": "kubevirt-0:4.13.0-1469.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt@4.13.0-1469.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "product": { "name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "product": { "name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "product_id": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el7?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "product": { "name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "product": { "name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "product_id": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el9?arch=aarch64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el9?arch=aarch64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "product": { "name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "product_id": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl@4.13.0-1469.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "product": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "product_id": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kubevirt-virtctl-redistributable@4.13.0-1469.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.13.0-1469.el7.src as a component of CNV 4.13 for RHEL 7", "product_id": "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src" }, "product_reference": "kubevirt-0:4.13.0-1469.el7.src", "relates_to_product_reference": "7Server-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7", "product_id": "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64 as a component of CNV 4.13 for RHEL 7", "product_id": "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "relates_to_product_reference": "7Server-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.13.0-1469.el8.src as a component of CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src" }, "product_reference": "kubevirt-0:4.13.0-1469.el8.src", "relates_to_product_reference": "8Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64" }, "product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "relates_to_product_reference": "8Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64 as a component of CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "relates_to_product_reference": "8Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64 as a component of CNV 4.13 for RHEL 8", "product_id": "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "relates_to_product_reference": "8Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-0:4.13.0-1469.el9.src as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src" }, "product_reference": "kubevirt-0:4.13.0-1469.el9.src", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64" }, "product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64" }, "product_reference": "kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "relates_to_product_reference": "9Base-CNV-4.13" }, { "category": "default_component_of", "full_product_name": { "name": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64 as a component of CNV 4.13 for RHEL 9", "product_id": "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" }, "product_reference": "kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64", "relates_to_product_reference": "9Base-CNV-4.13" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T00:39:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3204" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T00:39:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3204" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-32189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-08-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2113814" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32189" }, { "category": "external", "summary": "RHBZ#2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189" }, { "category": "external", "summary": "https://go.dev/issue/53871", "url": "https://go.dev/issue/53871" }, { "category": "external", "summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", "url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU" } ], "release_date": "2022-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T00:39:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3204" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service" }, { "cve": "CVE-2022-32190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-09-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124668" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32190" }, { "category": "external", "summary": "RHBZ#2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190" }, { "category": "external", "summary": "https://go.dev/issue/54385", "url": "https://go.dev/issue/54385" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T00:39:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3204" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-05-18T00:39:12+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3204" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-CNV-4.13:kubevirt-0:4.13.0-1469.el7.src", "7Server-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el7.x86_64", "7Server-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el7.x86_64", "8Base-CNV-4.13:kubevirt-0:4.13.0-1469.el8.src", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el8.x86_64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.aarch64", "8Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el8.x86_64", "9Base-CNV-4.13:kubevirt-0:4.13.0-1469.el9.src", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-0:4.13.0-1469.el9.x86_64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.aarch64", "9Base-CNV-4.13:kubevirt-virtctl-redistributable-0:4.13.0-1469.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2022_6882
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for OpenShift Logging 5.3.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Openshift Logging 5.3.13 security and bug fix release\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:6882", "url": "https://access.redhat.com/errata/RHSA-2022:6882" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_6882.json" } ], "title": "Red Hat Security Advisory: Openshift Logging 5.3.13 security and bug fix release", "tracking": { "current_release_date": "2024-12-17T22:04:13+00:00", "generator": { "date": "2024-12-17T22:04:13+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:6882", "initial_release_date": "2022-11-09T16:43:13+00:00", "revision_history": [ { "date": "2022-11-09T16:43:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-09T16:43:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:04:13+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Logging 5.3", "product": { "name": "OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:5.3::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "product_id": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "product_id": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.3.13-10" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "product": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.3.13-24" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "product_id": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "product_id": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.3.13-9" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.3.13-5" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-302" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.0.0-164" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-242" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-261" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "product_id": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.7.4-217" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "product_id": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-298" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64" }, "product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64 as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x as a component of OpenShift Logging 5.3", "product_id": "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x", "relates_to_product_reference": "8Base-OSE-LOGGING-5.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x" ], "known_not_affected": [ "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-09T16:43:13+00:00", "details": "For OpenShift Container Platform 4.9 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.3, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:6882" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-operator-bundle@sha256:b78456120cab1aac6044a6953e4dfd899f3c7d6b58a0e5cd8f166e4bffb5d941_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:29aab5ce5c349a6370de9dec73e1c27dba1f8ee7a82e7da7cd3957839743c1d8_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:d05f697c6da62036fcbba633a4cb6d253fdd6882c9205ad9a7cb9710878402a0_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/cluster-logging-rhel8-operator@sha256:e785074e66edd55f68d4971cb42bcc9612c9b2713593555162d82b9218368023_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-operator-bundle@sha256:c5218abf99c5401fbcec34c93f99805e109d889b27c28719f0ce75a952015f17_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:2eb93d134ac01322408a31538fa14f3d29b77568ad20f71e2bc2303eca957c05_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:6a0c8026b1fbc39d1a012f963eed016f3df99745235a256898cc3f92b5c913f3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-proxy-rhel8@sha256:cea0810e580ab422b8f54ae0f095f1ef4346cfef81873b5999a66cdc2687165a_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:34de2b2acd8ee51055a51659b5a9e8331ebdd1512be34969e60e412269b4d494_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:819e2985a882f2ddb34a137b0886d13ed764dac5b976fc4b450ba23cbc09597a_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch-rhel8-operator@sha256:a57abda6ba1cde99d47f6ea7a63e17a258f1f9ea73ca8bceadad7541477e7b81_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:1cd6bbc32620099b0e2b6a31ec0d0a82a3d4819f3d3c4ce5312b24277e89e4bf_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:211271d2e88eaf7f0930dbf2badf78dbe051ae14b68e67073b1b1b992fa9ea6e_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/elasticsearch6-rhel8@sha256:96fa422c95c3aa328015bfa158f22885653191eb418718fbc416b9de1fed0a0c_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:85dbeff544f48c08d0351eca88b10b7b07cea181382472a8d6b766d4facbbb5f_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:b712b4568533eccc3e67894c69a27f024a710c0a0759cb04a799077bc21ad7b0_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/fluentd-rhel8@sha256:e7fbe0c13c6fd405701b13af609008e8c954c489ab567aeae27f035835c327e8_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:8b3b9895d498036e7fb7451f52757ce8f3832d711254ed6649e97fe06d16195a_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:a3c5a69dba9fafdbbe21b7eaf0792a8d0d7dbc108977dde72bce3af4ba709a01_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/kibana6-rhel8@sha256:f7ac478a6b3a33ab3be1f64a8ecf389194f9c6a1c07d936b318d7918a5f782d3_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:3c36dfe54c3597a2c0ba0fcf6fbd991e479847f9b7f8957fb60eb7039e1e662e_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:45a595d11960d01f153dfe7ff6f8336aa1ccf09c044d7e26763ae348c8dc1181_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/log-file-metric-exporter-rhel8@sha256:db3841437512ac4716465336e1a520a6a702433b169e955ba04cdc41d6fa4eea_s390x", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:8fde863a056af0d59dfa63ffa9f65af94ce5a6d2713ee84d35ea19dc5357f583_ppc64le", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:e8297522f54b2649a08e10dd5a2ff7d01e6012e87cc82de876be7a2ace292011_amd64", "8Base-OSE-LOGGING-5.3:openshift-logging/logging-curator5-rhel8@sha256:f7fa0d3ea11001123fa1f59b2ae1edb230fb96157b19ec230d876793b4ed1554_s390x" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2023_0795
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Submariner 0.13.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.6\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nSecurity fixes:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags\n\nBugs addressed:\n\n* Build Submariner 0.13.3 (ACM-2226)\n* Verify Submariner with OCP 4.12 (ACM-2435)\n* Submariner does not support cluster \"kube-proxy ipvs mode\" (ACM-2821)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0795", "url": "https://access.redhat.com/errata/RHSA-2023:0795" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "ACM-2226", "url": "https://issues.redhat.com/browse/ACM-2226" }, { "category": "external", "summary": "ACM-2435", "url": "https://issues.redhat.com/browse/ACM-2435" }, { "category": "external", "summary": "ACM-2821", "url": "https://issues.redhat.com/browse/ACM-2821" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0795.json" } ], "title": "Red Hat Security Advisory: RHSA: Submariner 0.13.3 - security updates and bug fixes", "tracking": { "current_release_date": "2024-12-17T22:10:22+00:00", "generator": { "date": "2024-12-17T22:10:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:0795", "initial_release_date": "2023-02-15T21:46:51+00:00", "revision_history": [ { "date": "2023-02-15T21:46:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-02-15T21:46:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:10:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.6::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "product": { "name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "product_id": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "product": { "name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "product_id": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "product_id": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "product_id": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "product": { "name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "product_id": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "product": { "name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "product_id": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "product_id": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "product_id": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "product": { "name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "product_id": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "product": { "name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "product_id": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "product_id": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "product_id": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "product": { "name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "product_id": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "product_identification_helper": { "purl": "pkg:oci/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/nettest-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "product": { "name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "product_id": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.13.3-7" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "product_id": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.13.3-9" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "product_id": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.13.3-6" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.13.3-7" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le" }, "product_reference": "rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x" }, "product_reference": "rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64" }, "product_reference": "rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64" }, "product_reference": "rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x" }, "product_reference": "rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64" }, "product_reference": "rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le" }, "product_reference": "rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64" }, "product_reference": "rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.6" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.6 for RHEL 8", "product_id": "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64", "relates_to_product_reference": "8Base-RHACM-2.6" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-15T21:46:51+00:00", "details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.6/html/add-ons/add-ons-overview#submariner-deploy-console\n\nand\n\nhttps://submariner.io/getting-started/", "product_ids": [ "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0795" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:44576acbfff4321af54d8a8c15b0122d28ffbec8b88ebbdd32ed2dca3d4397c3_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:6f8f3c288619a58ac723cde85df5232efac7f5ccfd516cb3996b35304d11e7f5_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:c45d4a19f6492a1d2d72375c12d3dfc8a7a2349ccc8b581ad7df299bd63ae0a9_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-agent-rhel8@sha256:fde7510f372c447d265b01dcd0e36c7e53f0be4ab109b3d4a81b3dd857d3a127_s390x", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3e4d5bf90e110c3cf3e988f572d227575727bf1769c02d132272b5ff5051cfb8_arm64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:3ee425b4f78fe809d50967ae7c66af42c894a1fec5ef194d17eae9fdf5902913_amd64", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:a842e4824cd39bc438c38889896dd33372b644968b5e29b614c9529b2e0696cc_ppc64le", "8Base-RHACM-2.6:rhacm2/lighthouse-coredns-rhel8@sha256:e90e99636dce63fdc6323203694eac2aea9d7e2a0578ed444fce67144838b7ca_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:623848329900b7fe55763dd08bacb5fde147f0b9e8b77487f1b99a8b713d309e_ppc64le", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:84cb8594ccf7876483cee84195d704d34721f566e6a36070f7eecaca10fb2c88_s390x", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:a1197fa88e7cbaac9c4c80e13d39eda732d9ff09579d7d2e96a96bb5c005e695_arm64", "8Base-RHACM-2.6:rhacm2/nettest-rhel8@sha256:b674ef3a8a7e20b085ceeb9be1f536e0bc0f94dec384e88569105c865fdae224_amd64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:18b4fa76cfef84236c8453eb0cd6b1c67d1017732fa1d5722931d8616c365cfe_s390x", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:1f4051093fb1128e7266a4baff92bb7e9864825d51947265bed4ae7c20a3f99c_arm64", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:2e17954946ea1fd3ec53791a1b6dfdfb59be7c24fd78816b0ba721c069350c38_ppc64le", "8Base-RHACM-2.6:rhacm2/subctl-rhel8@sha256:dc61ab7c1ad6478e9bb30b36a2a356c5ec137bc0d5109e03ba57a76081015715_amd64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:1abe2013043c37997233ed7d8785c4607be1f21ed25f130f2141f8a771f0e9d5_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5100f65e2591023eb9da4512b464c49bbf7f56d1a78587e5da790d6cb52cfd7c_s390x", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:5cd02e62ae81fea9887c484b4b4f52712b3cdfe0bff8a826e2c1c8e813df50bf_arm64", "8Base-RHACM-2.6:rhacm2/submariner-gateway-rhel8@sha256:93b7d3fbd69a47187a595e09324ef603d8e0c808c99961719a56029776a25dfb_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:2bc43c6e55f35522be8752d1ae9eb24637a0926f91fa0f6cbf670f23a61b7840_amd64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:4ee144a663c95a2fcc1fbfc0b308cf7033a5ded97a28a5aec9f35250df812661_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:dc50bdc2082127c9df0da5b539ac61d244250eb93d7fcfd3a9d2fdbb10603695_arm64", "8Base-RHACM-2.6:rhacm2/submariner-globalnet-rhel8@sha256:fb728331ee01f6fb72a54b5c5b5886ec08f014a384c1b49beec692439ec59630_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:1ef8557fc7489a74092c22e5cf96ebbec1575f72177534de2ae095ab96927a5a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:50281b32dc626b66b8b38bc3fa97d799ab13b66029768e60c06d3fa5d9a29bf1_s390x", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:511362c4a5dfa734d0015a355185a86ba6c00a0466f5fb1b469fa00e07858c82_amd64", "8Base-RHACM-2.6:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:7076fac5d7944c7d4a0fa0e89629372466baf9fc5b4b8e5c31cc71b80fac9a69_arm64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:1e3de5b269f4454e822201ea7666bacab9c2962f454368b1967dd583cab5c9bc_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:2d28ae6efe8ba1999f5ae960cc1799465188b03514697c0192be53c4a7d1e8f2_s390x", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:4c9802569b6aad59f01718b5c692f32e3a9a9b35b7b82e69fed5e1f9573dbc17_amd64", "8Base-RHACM-2.6:rhacm2/submariner-operator-bundle@sha256:7dacd7a2b26ee22f62851127de612e9c18696c7db4ed06a244ce635b12cb89e2_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:71a36fc0e726890c4a95668d10f024cd31168c26d00d7a22b9f3e26a811af803_amd64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:db99ef3c89ac45501a7b7fc64c6f853df5f781b2200a758e71debc4dadaf2fef_arm64", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:e54bed5d1233969accf57b3b11f4d934040d7d408440d900d071f8919b60affa_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-rhel8-operator@sha256:fc6f14a4af741d3de8c0de1859fc0925d66673b5b7ced139b758b51a52307c5a_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:007edcf9dd166ec8c1b30f60755bcfe02dee03c2d8e539fba06615b8a3eefd58_arm64", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:0b40af2abd40a0d9220fd7311770cbbf0dddbc58b5347399c13fa92dae8dc2be_s390x", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:a08eecb9e361d8466db2adeafdf203fdc199a9d269910741909f73c341b28f4a_ppc64le", "8Base-RHACM-2.6:rhacm2/submariner-route-agent-rhel8@sha256:bb96dde2023a0b8a0d8b33095374ddcc828de182f04033253e716d584c8db623_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2023_0481
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Submariner 0.12.3 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.5.\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Submariner enables direct networking between pods and services on different Kubernetes clusters that are either on-premises or in the cloud.\n\nFor more information about Submariner, see the Submariner open source community website at: https://submariner.io/.\n\nThis advisory contains bug fixes and enhancements to the Submariner container images.\n\nMajor bug addressed: \n\nACM-2318: Submariner gateway node: Error updating load balancer with new hosts map\n\nSecurity fix:\n\n* CVE-2022-32149 golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0481", "url": "https://access.redhat.com/errata/RHSA-2023:0481" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "ACM-2318", "url": "https://issues.redhat.com/browse/ACM-2318" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0481.json" } ], "title": "Red Hat Security Advisory: Submariner 0.12.3 - security update and bug fix", "tracking": { "current_release_date": "2024-12-17T22:08:34+00:00", "generator": { "date": "2024-12-17T22:08:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:0481", "initial_release_date": "2023-01-26T21:22:22+00:00", "revision_history": [ { "date": "2023-01-26T21:22:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-01-26T21:22:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:08:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product": { "name": "Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:acm:2.5::el8" } } } ], "category": "product_family", "name": "Red Hat ACM" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "product": { "name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "product_id": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "product_id": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "product_id": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6?arch=amd64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1" } } } ], "category": "architecture", "name": "amd64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "product": { "name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "product_id": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "product_id": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "product_id": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440?arch=ppc64le\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "product": { "name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "product_id": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "product_id": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "product_id": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08?arch=arm64\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "product": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "product_id": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-agent-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "product": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "product_id": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "product_identification_helper": { "purl": "pkg:oci/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/lighthouse-coredns-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "product": { "name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "product_id": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "product_identification_helper": { "purl": "pkg:oci/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/subctl-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "product": { "name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "product_id": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-gateway-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "product": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "product_id": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-globalnet-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "product": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "product_id": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-networkplugin-syncer-rhel8\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "product": { "name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "product_id": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-operator-bundle\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "product": { "name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "product_id": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-rhel8-operator\u0026tag=v0.12.3-1" } } }, { "category": "product_version", "name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "product": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "product_id": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "product_identification_helper": { "purl": "pkg:oci/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a?arch=s390x\u0026repository_url=registry.redhat.io/rhacm2/submariner-route-agent-rhel8\u0026tag=v0.12.3-1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64" }, "product_reference": "rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64" }, "product_reference": "rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le" }, "product_reference": "rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x" }, "product_reference": "rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64" }, "product_reference": "rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64" }, "product_reference": "rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x" }, "product_reference": "rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x" }, "product_reference": "rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64" }, "product_reference": "rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64" }, "product_reference": "rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64" }, "product_reference": "rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "relates_to_product_reference": "8Base-RHACM-2.5" }, { "category": "default_component_of", "full_product_name": { "name": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64 as a component of Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8", "product_id": "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64" }, "product_reference": "rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64", "relates_to_product_reference": "8Base-RHACM-2.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-01-26T21:22:22+00:00", "details": "For details on how to install Submariner, refer to:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/add-ons/add-ons-overview#submariner-deploy-console \n\nand\n\nhttps://submariner.io/getting-started/", "product_ids": [ "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0481" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:33ac96a6dd01e698c6d037acd701ee0fc5a09bb1cdd8f761c229e6a2be9ea799_amd64", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:6b579e761576bd97f05c1f5ba42df74db5d22d0203e9d0253efc324cb0bf6378_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:998706bb956a4fdd15526b5bb6a0458d59ea5cc537e2784b6dec1bb24b6aebbd_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-agent-rhel8@sha256:b76b9fc2f08fdedd74511526b3f049a37e8beab3dddd9c3463ea20064aadf194_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:4af85e8acaa3b787828a3352bbfff427c6668936c428169e5fcbd345e802fcc3_arm64", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:77e474f4e0be091c3772ec0c16f2a67168dfea599a1f4220deb2fcb795d2d9c7_ppc64le", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:dbc246166dd35202221ac3f885a0e46160a6d277a058b6d2f1c7ee571c673b50_s390x", "8Base-RHACM-2.5:rhacm2/lighthouse-coredns-rhel8@sha256:f27e7895a859ee2ab5f36134522349c1c04f3b18284787e0d14c3380126bf402_amd64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:47cd1ee9aff93dad2e554805836e3393a0d5fc408ffc41a3ffef4676e10ce1f9_ppc64le", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:9ab13f289008d38a7cfa2182e4a5fb3a29b0b8efa2da40916018f2449ca730c7_s390x", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:dae78580dc26a6beaaeef47575e0cc13c487d5cef1d72c415ddc19368ef3b4a5_arm64", "8Base-RHACM-2.5:rhacm2/subctl-rhel8@sha256:e6f5f07b97d4998c122cadeee693dce4d72f3bbe2c1f9703b15621b6531cf3a4_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:2bdd80c985f13cc90a223979c7b26bd5a273504ce973ea2c24b599e1c5f1b3fc_arm64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:522bddc7d016659157c51f7425098eb92f2b0857f921f5ef01e188af3c9056c6_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:7b343f4f8ea08b2e2a670ee938a2286a92d701e5e92f4f43ee58e620e2ee070b_amd64", "8Base-RHACM-2.5:rhacm2/submariner-gateway-rhel8@sha256:825db9cddd68a762e934bc855e5836e4f16a566f59d1310f45a06dac85ab8035_s390x", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:3b04b0be64ea639e82496102236899cc62a2521c8e8bebd07c852118e76bce88_amd64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:c9050e94421701df533d7bc7fb2736de3b923a1b9689f7db9285e902d1d9c173_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d7fdc22644e6dbf19f21130c0f635e0a6c6e11fb9cbf9d9cbd9635d17fe25fbf_arm64", "8Base-RHACM-2.5:rhacm2/submariner-globalnet-rhel8@sha256:d855b05d15a54a88e2c026e0d1935b189dc7ceddb3a7b5b0672e8e4c715f3845_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:0b72b8b294483dcf92d8acaaa56e8ac1141db3c6811ab64298117fafde99936a_arm64", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:39ca01ef63bc7d2663186a516456c90657b918a2ec044af7aadb1315a607f429_s390x", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:5a86959a38334532e5a33ab76b0553a9eae4cfad8897d5f92457a11cb6a5374b_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-networkplugin-syncer-rhel8@sha256:91bc8d57c88c771bda7a6703ced10e32e9999116fe8cb7e4adddb6198591eeac_amd64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:40b62e497e8280cb4db3803ad140e9aa15f038e15b3e1218d0c506646f576aec_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:71c8912419b9a6ac3ddd911c0a2fd097170743efab7dcb1c14141e5e1defc738_arm64", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:f86cb9bb9dc189057de11e2a5c3c1c10597c78e82432a34cf2864c6a32f8e6fa_s390x", "8Base-RHACM-2.5:rhacm2/submariner-operator-bundle@sha256:fa2fd74dc3918d962ee6ea162e765f45b75a9588017145cd8322469456bc7164_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:2aad67f470d3a58382029b4db1459916036a8f41aed167d567eb1abef45cda3f_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:971eeffff35343edb6da2be6d2d3620d13536cbbaddacbbd13f285a70490df3a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:98811cc217f48bc7a6fbe7d4ccf7b1b7b239e19e24b7fcfeacbec8b297880f89_amd64", "8Base-RHACM-2.5:rhacm2/submariner-rhel8-operator@sha256:dc2a4dace498a5c6238c555411362c2e6166011582a572d3cab431c745143301_arm64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:0f13ca7bb60b17115395a51421916f0136a6d1296da563ba609cf37ec4e31440_ppc64le", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:497545ae0c5ae10463c5ef4a56c0e3733efbff2da65754dce4bbb977cb80d55a_s390x", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:6bff7c4285999b218937924fc75e6303525089064f21d23234a01f453529fbf6_amd64", "8Base-RHACM-2.5:rhacm2/submariner-route-agent-rhel8@sha256:d0140f18ad07368201a6e34af970ac9ee402f8ac292e71c42244af85eb37db08_arm64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2022_7435
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Logging subsystem for Red Hat OpenShift 5.4.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Logging Subsystem 5.4.8 - Red Hat OpenShift\n\nSecurity Fix(es):\n\n* jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS (CVE-2022-42003)\n\n* jackson-databind: use of deeply nested arrays (CVE-2022-42004)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7435", "url": "https://access.redhat.com/errata/RHSA-2022:7435" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "LOG-3250", "url": "https://issues.redhat.com/browse/LOG-3250" }, { "category": "external", "summary": "LOG-3252", "url": "https://issues.redhat.com/browse/LOG-3252" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7435.json" } ], "title": "Red Hat Security Advisory: Logging Subsystem 5.4.8 - Red Hat OpenShift security update", "tracking": { "current_release_date": "2024-12-17T22:05:39+00:00", "generator": { "date": "2024-12-17T22:05:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2022:7435", "initial_release_date": "2022-11-16T12:13:01+00:00", "revision_history": [ { "date": "2022-11-16T12:13:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-16T12:13:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:05:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHOL 5.4 for RHEL 8", "product": { "name": "RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:logging:5.4::el8" } } } ], "category": "product_family", "name": "logging for Red Hat OpenShift" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "product_id": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "product_id": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "product_id": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "product_id": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "product": { "name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "product_id": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "product_id": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "product_id": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "product_id": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "product_id": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "product_id": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "product": { "name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "product_id": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "product_id": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "product_id": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "product_id": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "product_id": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "product": { "name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "product_id": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "product_id": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4" } } } ], "category": "architecture", "name": "arm64" }, { "branches": [ { "category": "product_version", "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "product": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "product_id": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-rhel8-operator\u0026tag=v5.4.8-6" } } }, { "category": "product_version", "name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "product": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "product_id": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "product_identification_helper": { "purl": "pkg:oci/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/cluster-logging-operator-bundle\u0026tag=v5.4.8-7" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "product": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "product_id": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-rhel8-operator\u0026tag=v5.4.8-3" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "product": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "product_id": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-operator-bundle\u0026tag=v5.4.8-11" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "product": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "product_id": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel8\u0026tag=v1.0.0-300" } } }, { "category": "product_version", "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "product": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "product_id": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "product_identification_helper": { "purl": "pkg:oci/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel8\u0026tag=v1.1.0-74" } } }, { "category": "product_version", "name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "product": { "name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "product_id": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-curator5-rhel8\u0026tag=v5.8.1-246" } } }, { "category": "product_version", "name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "product": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "product_id": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "product_identification_helper": { "purl": "pkg:oci/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/elasticsearch6-rhel8\u0026tag=v6.8.1-265" } } }, { "category": "product_version", "name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "product": { "name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "product_id": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "product_identification_helper": { "purl": "pkg:oci/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/eventrouter-rhel8\u0026tag=v0.4.0-55" } } }, { "category": "product_version", "name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "product": { "name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "product_id": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "product_identification_helper": { "purl": "pkg:oci/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/fluentd-rhel8\u0026tag=v1.14.5-36" } } }, { "category": "product_version", "name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "product": { "name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "product_id": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "product_identification_helper": { "purl": "pkg:oci/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/kibana6-rhel8\u0026tag=v6.8.1-302" } } }, { "category": "product_version", "name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "product": { "name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "product_id": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "product_identification_helper": { "purl": "pkg:oci/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/logging-loki-rhel8\u0026tag=v2.5.0-51" } } }, { "category": "product_version", "name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64", "product": { "name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64", "product_id": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64", "product_identification_helper": { "purl": "pkg:oci/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/vector-rhel8\u0026tag=v0.14-67" } } }, { "category": "product_version", "name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "product": { "name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "product_id": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-operator-bundle\u0026tag=v5.4.8-20" } } }, { "category": "product_version", "name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "product": { "name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "product_id": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "product_identification_helper": { "purl": "pkg:oci/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/loki-rhel8-operator\u0026tag=v5.4.8-4" } } }, { "category": "product_version", "name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "product": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "product_id": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "product_identification_helper": { "purl": "pkg:oci/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/lokistack-gateway-rhel8\u0026tag=v5.4.8-5" } } }, { "category": "product_version", "name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "product": { "name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "product_id": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "product_identification_helper": { "purl": "pkg:oci/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging/opa-openshift-rhel8\u0026tag=v5.4.8-4" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64" }, "product_reference": "openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64" }, "product_reference": "openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64" }, "product_reference": "openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64" }, "product_reference": "openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x" }, "product_reference": "openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" }, "product_reference": "openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x" }, "product_reference": "openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le" }, "product_reference": "openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64" }, "product_reference": "openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64" }, "product_reference": "openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le" }, "product_reference": "openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le" }, "product_reference": "openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64" }, "product_reference": "openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64" }, "product_reference": "openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64" }, "product_reference": "openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x" }, "product_reference": "openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x" }, "product_reference": "openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le" }, "product_reference": "openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64" }, "product_reference": "openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "relates_to_product_reference": "8Base-RHOL-5.4" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64 as a component of RHOL 5.4 for RHEL 8", "product_id": "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" }, "product_reference": "openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64", "relates_to_product_reference": "8Base-RHOL-5.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-36518", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-03-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2064698" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Jackson Databind package. This cause of the issue is due to a Java StackOverflow exception and a denial of service via a significant depth of nested objects.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: denial of service via a large depth of nested objects", "title": "Vulnerability summary" }, { "category": "other", "text": "CodeReady Studio is no longer supported and therefore this flaw will not be addressed in CodeReady Studio.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "known_not_affected": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-36518" }, { "category": "external", "summary": "RHBZ#2064698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-36518", "url": "https://www.cve.org/CVERecord?id=CVE-2020-36518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-36518" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-57j2-w4cx-62h2", "url": "https://github.com/advisories/GHSA-57j2-w4cx-62h2" } ], "release_date": "2020-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-16T12:13:01+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: denial of service via a large depth of nested objects" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64" ], "known_not_affected": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-16T12:13:01+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-42003", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135244" } ], "notes": [ { "category": "description", "text": "A flaw was found in FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion when the UNWRAP_SINGLE_VALUE_ARRAYS feature is enabled due to unchecked primitive value deserializers to avoid deep wrapper array nesting.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "known_not_affected": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42003" }, { "category": "external", "summary": "RHBZ#2135244", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135244" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42003", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42003" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-16T12:13:01+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS" }, { "cve": "CVE-2022-42004", "cwe": { "id": "CWE-502", "name": "Deserialization of Untrusted Data" }, "discovery_date": "2022-10-17T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2135247" } ], "notes": [ { "category": "description", "text": "A flaw was found In FasterXML jackson-databind. This issue could allow an attacker to benefit from resource exhaustion due to the lack of a check in BeanDeserializer._deserializeFromArray to prevent the use of deeply nested arrays. An application is only vulnerable with certain customized choices for deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "jackson-databind: use of deeply nested arrays", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "known_not_affected": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42004" }, { "category": "external", "summary": "RHBZ#2135247", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2135247" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42004", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42004" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42004" } ], "release_date": "2022-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-16T12:13:01+00:00", "details": "For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html\n\nFor Red Hat OpenShift Logging 5.4, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html", "product_ids": [ "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7435" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOL-5.4:openshift-logging/cluster-logging-operator-bundle@sha256:cb26d9e55f781dd535901a90f1ec2f8e02e8e1de72c0fde638c90fcc228ec4b2_amd64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:617cc8b0011110981674b75fe1e3041bfa434c952e4a0193818b971edbc7a480_s390x", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:637df49756fe85e7b38b279ffa7672d72c658d3d47df7f9dada2dd70563af83b_arm64", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:aa1602fe2abe23bd8a4c791bc45d425686a6e6d1aab4face0fac28bfc7cebbe1_ppc64le", "8Base-RHOL-5.4:openshift-logging/cluster-logging-rhel8-operator@sha256:c698b52c46d41007e5ac4f90b9540d430820bd20a93468fddd3a949c7ef5b332_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-operator-bundle@sha256:7659606e0418a1920161b7ca67524ea6a7b1ed366b817f1a5cde0b346152243c_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:4f4e5bb267ad391bc0fc6a010ec9ecdf3bf48d5b6e9db0d2510960c13c97bd71_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:b9c2e58b39dc3de97013f8806178f6327bf2e4590fe55db144527d64d468f64f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:c9a2b9e7cca14d9596ccbe0f64e2abe4452f91f029f42eefead43c9f526f6a58_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-proxy-rhel8@sha256:e38c55762c1eef39b401c46d44c899067b1566173e1ce239f17a95c52b30d8c7_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:2005f41e59a130bb86c2ec47d1b060e3e2ed32f9a4cef3897e2c05fc94043dbb_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:6a55934cf7af0c03e06d4ec7a15a80acf53491fb7a183c16fdf8018fbf9b4174_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:8ce04536772f31ad022b9c66cddc090d2962b44d66c06a1db56d1447be198326_amd64", "8Base-RHOL-5.4:openshift-logging/elasticsearch-rhel8-operator@sha256:dd211d42eaad043d9bdb519e3ad6a86255b7280a2cdf47dd3fe0458a77cb110f_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:17a9f3ae042b92693a374e3d60a07f2ab2e52419f8df25d446dd0654f6a858f6_ppc64le", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:5b1cfc2f9a96601439cf17d1fe49a6bc6cad3b7273af87b23528090aefbfd915_s390x", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:8e0ba10f91db4cb8786d0501ec33a3d54f7c7c5337e0495cc2286a6ea20cca20_arm64", "8Base-RHOL-5.4:openshift-logging/elasticsearch6-rhel8@sha256:fa8182b69328077500f89becc7621b48efa8d99f34247c2e6855dcfec13980e3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:4438a3bba34418a9dc566bf15f6b4764de4295ab8b05a7b1a86f9e8cd332b3f7_arm64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:bc408fc4b0482c5eb1b0deb3a9090f3e3dd9b370001d54cd076254562c72fec9_ppc64le", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:d50a2b89442d04b1163c01b3a3951857a95df76c57b14e7f51d835c3ac6d75b3_amd64", "8Base-RHOL-5.4:openshift-logging/eventrouter-rhel8@sha256:f05aee8433dec1c9f6cf835038f9e5a47847d4095383bf3c22ca57c3fb69fa98_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:150e17cb645cf2f4cb7ab592572dd3abd145d9a33e790778280e256666248022_amd64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:36aecf05ca3cdaf29982b3efa4a1c97087be29b0a58c9777e6b0c11a34861aa8_s390x", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:e3a51d2bdc632b8376e28c33e9d4fac3464e3a84a313a17246b1f1cf21cb5710_arm64", "8Base-RHOL-5.4:openshift-logging/fluentd-rhel8@sha256:ea07da04f06df6bf0d9dd981a3795dfdb51eca83f59a6291114650e3e98a9e71_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:167ee6a645c7397bde3d12e9b9685279505c25ffb3bda11ae68bdf0b34229f2e_amd64", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:4a029733337b10bb9fb8d98c91abc5451ca0b98713c8f2271a675251e025b6c0_s390x", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:812f4380024dc3df42310ad14d173d390f2bdf4b3dbdb02550c00552534f79ce_ppc64le", "8Base-RHOL-5.4:openshift-logging/kibana6-rhel8@sha256:958ba6856cc76fc77d34a9c78888eb37b9c39b83a2f044ef2337610560ba9323_arm64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:043e4d3481fbfedf3115e18fade3a2f33b891b0d9a641bf973c2c7f492cb0489_amd64", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:4fe26adac10cf20b83812e4fa513231d7e1fd4b6cd4e09d4fd425c391885cfcc_ppc64le", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:85827db708c0927027435b05732cc7e34b0675eaa86665c91efacc76aecd6227_s390x", "8Base-RHOL-5.4:openshift-logging/log-file-metric-exporter-rhel8@sha256:a5285db276a5545fdbaa9f0743a49ba72ce1c5da61b5cccc9422320a03e08bea_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:0b28415b8115ff3216002faa5c9ecf3c46995085e3364c8028cb544cb4787ed2_arm64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:7016e867ddfe970d6d2d54d5615e8f613786bcfbfe52ebf3139c07da3d5a53db_s390x", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:94c435f45e9dbd9fa633e137356cfb1d6ac2d4dd7574b359367665da42d6203d_amd64", "8Base-RHOL-5.4:openshift-logging/logging-curator5-rhel8@sha256:d24afbc9228ef7f3d0a6fd716a3a57abde88a1f65d149c7df4f959a775b670bd_ppc64le", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:40d4989b4733f54a01a73831fa00b12e49fff69c75138902eac0d894d432e4d9_arm64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:b444af35118c24bde0dfa2a8825ba427b3345451f6081133477254213a3460f0_amd64", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:cfe410d498940a95da631ea213866a96a119034d78d5d53f7f9c7e8da56e0f45_s390x", "8Base-RHOL-5.4:openshift-logging/logging-loki-rhel8@sha256:f7979c82140a0ab1a97c9f3151465bfbd9f79c4db9b0cc20f974cd7b890f074f_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-operator-bundle@sha256:02cceda51028eb55a3b82aa5275f03dbaf8f8f9ab3fd27c650d1a07a93044e37_amd64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:0f1be625b4012820f7ac439fed000808d7acb4e885ace16014461bf802be935a_s390x", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:28f45a80846c5e11638fb479be42cafcb2bdb3af94dff3629a820de295cbe31d_ppc64le", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:df7de1e9f5a4396df6f14b1c4b6bb2a9ae4bc50d82cbc954ec535c26e8df2cb1_arm64", "8Base-RHOL-5.4:openshift-logging/loki-rhel8-operator@sha256:f8a35557c9eb27f703ffa9320a9d39a2361d93fdb0b8c874d97da458048e7eec_amd64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:178fcf44e6a1fa90d27a40565f69ae2880622b017bc8d9e33a441353eb45609d_arm64", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:7b0c2c99cf0f710166b749dbfd7f544caf5fe35516c743fca251c7cec896e1d6_ppc64le", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:9c4959525339b607a98889d56f4c26f2e4af25032466c439903a7f1cb593f721_s390x", "8Base-RHOL-5.4:openshift-logging/lokistack-gateway-rhel8@sha256:a967d5be7d3a6fdd75965a5f9a7396a52cdcb37d6a8521c440b0b5c650c230f2_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:1b106af51bb50f1ce4db13ebbf6f6c67eae45611c0d5dc46476f1dfaa8aca166_arm64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:92ddf24824c8f8ae93dec07184c446615b635389472d3a525df72da07c8d9b97_ppc64le", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:9fd0c5df785564b35392705a479d6fb9245e3329719438c76c0282f9ef2f2d55_amd64", "8Base-RHOL-5.4:openshift-logging/opa-openshift-rhel8@sha256:be8ba0e4c5f24c7b4549700a25c89b10d4b2fc0b0e3888163bb53827914e95c1_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48bb136d11b44428c87489978873370848ac2b219b107ef7e81ab679db095234_s390x", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:48f0317d167710ff5b0787c73f6b7dd0249e7c8d2d001159132a97299c30b62d_ppc64le", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:bde21c03fb831d01e85b28245881f7e3f2bb2ef6d2671eb92b2e0cc4bd3898e2_arm64", "8Base-RHOL-5.4:openshift-logging/vector-rhel8@sha256:cc6b9c6a344aac56c99c96b5120ffe2dad479000b34964ff89d030ae762bda43_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jackson-databind: use of deeply nested arrays" } ] }
rhsa-2023_0693
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "The Migration Toolkit for Containers (MTC) 1.7.7 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Migration Toolkit for Containers (MTC) enables you to migrate Kubernetes resources, persistent volume data, and internal container images between OpenShift Container Platform clusters, using the MTC web console or the Kubernetes API.\n\nSecurity Fix(es) from Bugzilla:\n\n* async: Prototype Pollution in async (CVE-2021-43138)\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)\n\n* golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service (CVE-2022-32189)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:0693", "url": "https://access.redhat.com/errata/RHSA-2023:0693" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2126276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2160662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2160662" }, { "category": "external", "summary": "2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "MIG-1275", "url": "https://issues.redhat.com/browse/MIG-1275" }, { "category": "external", "summary": "MIG-1281", "url": "https://issues.redhat.com/browse/MIG-1281" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0693.json" } ], "title": "Red Hat Security Advisory: Migration Toolkit for Containers (MTC) 1.7.7 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:09:24+00:00", "generator": { "date": "2024-12-17T22:09:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:0693", "initial_release_date": "2023-02-09T02:17:22+00:00", "revision_history": [ { "date": "2023-02-09T02:17:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-02-09T02:17:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:09:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "8Base-RHMTC-1.7", "product": { "name": "8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhmt:1.7::el8" } } } ], "category": "product_family", "name": "Red Hat Migration Toolkit" }, { "branches": [ { "category": "product_version", "name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "product": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "product_id": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-controller-rhel8\u0026tag=v1.7.7-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "product": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "product_id": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-hook-runner-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "product": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "product_id": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-legacy-rhel8-operator\u0026tag=v1.7.7-9" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "product": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "product_id": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-log-reader-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "product": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "product_id": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-must-gather-rhel8\u0026tag=v1.7.7-4" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "product": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "product_id": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-openvpn-rhel8\u0026tag=v1.7.7-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "product": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "product_id": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rhel8-operator\u0026tag=v1.7.7-9" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "product": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "product_id": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-operator-bundle\u0026tag=v1.7.7-9" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "product": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "product_id": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-registry-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "product": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "product_id": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-rsync-transfer-rhel8\u0026tag=v1.7.7-2" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "product": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "product_id": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-ui-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "product": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "product_id": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-rhel8\u0026tag=v1.7.7-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-aws-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "product": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "product_id": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8\u0026tag=v1.7.7-3" } } }, { "category": "product_version", "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "product": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "product_id": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-migration-velero-restic-restore-helper-rhel8\u0026tag=v1.7.7-5" } } }, { "category": "product_version", "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64", "product": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64", "product_id": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64", "product_identification_helper": { "purl": "pkg:oci/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868?arch=amd64\u0026repository_url=registry.redhat.io/rhmtc/openshift-velero-plugin-rhel8\u0026tag=v1.7.7-3" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64" }, "product_reference": "rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64" }, "product_reference": "rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64" }, "product_reference": "rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64" }, "product_reference": "rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64" }, "product_reference": "rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64" }, "product_reference": "rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64" }, "product_reference": "rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64" }, "product_reference": "rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64" }, "product_reference": "rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64" }, "product_reference": "rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64" }, "product_reference": "rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" }, "product_reference": "rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" }, { "category": "default_component_of", "full_product_name": { "name": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64 as a component of 8Base-RHMTC-1.7", "product_id": "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" }, "product_reference": "rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64", "relates_to_product_reference": "8Base-RHMTC-1.7" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43138", "cwe": { "id": "CWE-1321", "name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)" }, "discovery_date": "2022-09-13T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2126276" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the async package. This flaw allows a malicious user to obtain privileges via the mapValues() method.", "title": "Vulnerability description" }, { "category": "summary", "text": "async: Prototype Pollution in async", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-43138" }, { "category": "external", "summary": "RHBZ#2126276", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126276" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-43138", "url": "https://www.cve.org/CVERecord?id=CVE-2021-43138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43138" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25", "url": "https://github.com/advisories/GHSA-fwr7-v2mv-hh25" } ], "release_date": "2022-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "async: Prototype Pollution in async" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-32189", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-08-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2113814" } ], "notes": [ { "category": "description", "text": "An uncontrolled resource consumption flaw was found in Golang math/big. A too-short encoded message can cause a panic in Float.GobDecode and Rat.GobDecode in math/big in Go, potentially allowing an attacker to create a denial of service, impacting availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw stems from a particular and specific method (GoBDecode) which isn\u0027t commonly used. There are few components within Red Hat offerings which call this function. In rare cases where this method is called, the component limits possible damage or it is not possible to be triggered by an attacker. For these combined reasons the impact has been downgraded to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32189" }, { "category": "external", "summary": "RHBZ#2113814", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113814" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32189", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32189" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32189" }, { "category": "external", "summary": "https://go.dev/issue/53871", "url": "https://go.dev/issue/53871" }, { "category": "external", "summary": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU", "url": "https://groups.google.com/g/golang-nuts/c/DCFSyTGM0wU" } ], "release_date": "2022-08-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: math/big: decoding big.Float and big.Rat types can panic if the encoded message is too short, potentially allowing a denial of service" }, { "cve": "CVE-2022-32190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124668" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32190" }, { "category": "external", "summary": "RHBZ#2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190" }, { "category": "external", "summary": "https://go.dev/issue/54385", "url": "https://go.dev/issue/54385" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" }, { "cve": "CVE-2022-41717", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2023-01-16T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2161274" } ], "notes": [ { "category": "description", "text": "A flaw was found in the net/http library of the golang package. This flaw allows an attacker to cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests", "title": "Vulnerability summary" }, { "category": "other", "text": "Within Red Hat OpenShift Container Platform, the grafana container is listed as will not fix. Since OCP 4.10, Grafana itself is not shipped and the Grafana web server is protected behind an OAuth proxy server.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "known_not_affected": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41717" }, { "category": "external", "summary": "RHBZ#2161274", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2161274" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41717" }, { "category": "external", "summary": "https://go.dev/cl/455635", "url": "https://go.dev/cl/455635" }, { "category": "external", "summary": "https://go.dev/cl/455717", "url": "https://go.dev/cl/455717" }, { "category": "external", "summary": "https://go.dev/issue/56350", "url": "https://go.dev/issue/56350" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/L_3rmdT0BMU/m/yZDrXjIiBQAJ" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2022-1144", "url": "https://pkg.go.dev/vuln/GO-2022-1144" } ], "release_date": "2022-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-02-09T02:17:22+00:00", "details": "For details on how to install and use MTC, refer to:\n\nhttps://docs.openshift.com/container-platform/latest/migration_toolkit_for_containers/installing-mtc.html", "product_ids": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:0693" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "8Base-RHMTC-1.7:rhmtc/openshift-migration-controller-rhel8@sha256:362eb32d0d2607f72b4f425dabaea7cde5d292ac41aea0c18c78bc6e408fff9e_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-hook-runner-rhel8@sha256:aa63717ac3a4961e774ed0baa3a73f01eda185516e7380579d97b9d25764d10d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-legacy-rhel8-operator@sha256:1ac9cdfbdce8f7b6e4ebf5e40013f766b71b6dd604c92f602aca96612a228eda_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-log-reader-rhel8@sha256:d89e9ef65993466d25b26702d0210c14ce191155501774f4d2f1f08dbdad9804_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-must-gather-rhel8@sha256:5acf34dc4041b694b452d46c2f656db566241773285ca305a79ab7b9dc087b43_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-openvpn-rhel8@sha256:15df7304827ce49d422554551f08d99cfffa1afc4ffacac145d4399ccb1cbd68_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-operator-bundle@sha256:90ed03a5e0cb0b0ffd85f7434cc4eda9bd8fe81cd90b597772d9b7caccd4b80f_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-registry-rhel8@sha256:aaa03ef0769d38185675db2a7a78454659de14bdebe5ff842614bf2124e5adfe_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rhel8-operator@sha256:aaaf4f6095294b497889749390f0a3aac04b83131a423799c44b5e367e0b370a_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-rsync-transfer-rhel8@sha256:58bd4ffc3e9599401251ac929cf15c1773ecc03a57177118adbe23ac8d7762af_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-ui-rhel8@sha256:4141db5099ae659270297eb4aaff695ac43fce67d91fea49dbc76583f419d3a1_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-aws-rhel8@sha256:633eeb0b6b50e21bbc0fb12fd2262294733fc9ac8b1e9eedcdb9d1433534d88d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-gcp-rhel8@sha256:19dbf2bb83f8a0f35079d6ae25f8fcddad970e48ecb21694fd2d4c553313e4aa_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-plugin-for-microsoft-azure-rhel8@sha256:93e95f065eadaa41154b9012dd5ddc824607758e2bce85c4256c2689125b80a4_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-restic-restore-helper-rhel8@sha256:70d3d46f54b91538e047df62e7e5b161fabac195a2f2e45cdba78215b4c82a7d_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-migration-velero-rhel8@sha256:1ca6945c3918f1743a4cee86a507f9f6581c8f8e572b6b8739d79a675a64d1db_amd64", "8Base-RHMTC-1.7:rhmtc/openshift-velero-plugin-rhel8@sha256:26f8fb5c41ece82626325ba502505ba1ca7986602cc147b492f9857caa0be868_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: excessive memory growth in a Go server accepting HTTP/2 requests" } ] }
rhsa-2023_3613
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat OpenShift Container Platform release 4.12.22 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.12.\n\nRed Hat Product Security has rated this update as having a security impact of [impact]. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.12.22. See the following advisory for the container images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2023:3615\n\nSecurity Fix(es):\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* golang: net/url: JoinPath does not strip relative path components in all circumstances (CVE-2022-32190)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.12 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.12/updating/updating-cluster-cli.html.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:3613", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "url": "https://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html" }, { "category": "external", "summary": "2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_3613.json" } ], "title": "Red Hat Security Advisory: OpenShift Container Platform 4.12.22 packages and security update", "tracking": { "current_release_date": "2024-12-17T22:22:20+00:00", "generator": { "date": "2024-12-17T22:22:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:3613", "initial_release_date": "2023-06-26T01:19:15+00:00", "revision_history": [ { "date": "2023-06-26T01:19:15+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-06-26T01:19:15+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:22:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12::el9" } } }, { "category": "product_name", "name": "Red Hat OpenShift Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:4.12::el8" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-5.rhaos4.12.el9.src", "product": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.src", "product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-5.rhaos4.12.el9.src", "product": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.src", "product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "product": { "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=src" } } }, { "category": "product_version", "name": "podman-3:4.2.0-7.rhaos4.12.el9.src", "product": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.src", "product_id": "podman-3:4.2.0-7.rhaos4.12.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src", "product": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src", "product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "product": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-4.rhaos4.12.el8.src", "product": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.src", "product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "product": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=src" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.59.1.el8_6.src", "product": { "name": "kernel-0:4.18.0-372.59.1.el8_6.src", "product_id": "kernel-0:4.18.0-372.59.1.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=src" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "product": { "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=src" } } }, { "category": "product_version", "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "product": { "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "product_id": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "product": { "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "product": { "name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "product_id": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "product": { "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=src" } } }, { "category": "product_version", "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src", "product": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src", "product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-3:1.1.6-4.rhaos4.12.el8.src", "product": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.src", "product_id": "runc-3:1.1.6-4.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "product": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=src\u0026epoch=2" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "product": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "product": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "product": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "product": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "product": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "product": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=x86_64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64", "product": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "product": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "product": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "product": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "product": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "product": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "perf-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "perf-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-modules-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-selftests-internal@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.59.1.rt7.217.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product": { "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product_id": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients-redistributable@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=x86_64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "product": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_id": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "product": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "product": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=x86_64\u0026epoch=2" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "product": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "product": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "product": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "product": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "product": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "product": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=aarch64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "product": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "product": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "product": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "product": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "product": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "product": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "perf-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "perf-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=aarch64" } } }, { "category": "product_version", "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "product": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_id": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "product": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "product": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=aarch64\u0026epoch=2" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-ipaclones-internal@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_id": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=ppc64le\u0026epoch=2" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "product": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "product_id": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "product": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "product_id": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "product": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "product_id": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product_id": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.rhaos4.12.el9?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "product": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "product_id": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "product": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "product_id": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "product": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "product_id": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-5.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el9?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9?arch=s390x" } } }, { "category": "product_version", "name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_id": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-7.rhaos4.12.el9?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "product": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "product_id": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "product": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "product_id": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "product": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "product_id": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "product_id": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.rhaos4.12.el9?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_id": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_id": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_id": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_id": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_id": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.23.4-5.1.rhaos4.12.el8?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "product": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "product_id": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "product": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "product_id": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "product": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "product_id": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.2-4.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "product": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "product_id": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.0.1-7.rhaos4.12.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "product": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "product_id": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.0.1-7.rhaos4.12.el8?arch=s390x" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "product": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "product_id": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.0.1-7.rhaos4.12.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "bpftool-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-selftests-internal@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-internal@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "perf-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "perf-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.59.1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "product": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "product_id": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-hyperkube@4.12.0-202306121916.p0.g8c21020.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "product": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "product_id": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-clients@4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8?arch=s390x" } } }, { "category": "product_version", "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_id": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-6.1.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x", "product": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x", "product_id": "runc-3:1.1.6-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "product": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "product_id": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "product": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "product_id": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.6-4.rhaos4.12.el8?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_id": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_id": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_id": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_id": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.4-3.1.rhaos4.12.el8?arch=s390x\u0026epoch=2" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "product": { "name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "product_id": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-7.rhaos4.12.el9?arch=noarch\u0026epoch=3" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "product": { "name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "product_id": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.59.1.el8_6?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product_id": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product": { "name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product_id": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-ansible-test@4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-cni@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-common@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product": { "name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_id": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-kuryr-controller@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product": { "name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_id": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-kuryr-kubernetes@4.12.0-202306140156.p0.g31dd228.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "product": { "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "product_id": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift4-aws-iso@4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8?arch=noarch" } } }, { "category": "product_version", "name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "product": { "name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "product_id": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-6.1.rhaos4.12.el8?arch=noarch\u0026epoch=3" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64" }, "product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le" }, "product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x" }, "product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src" }, "product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64" }, "product_reference": "buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64" }, "product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le" }, "product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x" }, "product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64" }, "product_reference": "buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64" }, "product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le" }, "product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x" }, "product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64" }, "product_reference": "buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64" }, "product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le" }, "product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x" }, "product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src" }, "product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64" }, "product_reference": "conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64" }, "product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x" }, "product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64" }, "product_reference": "conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64" }, "product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le" }, "product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x" }, "product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64" }, "product_reference": "conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64" }, "product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le" }, "product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x" }, "product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src" }, "product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64" }, "product_reference": "containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.59.1.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src" }, "product_reference": "kernel-0:4.18.0-372.59.1.el8_6.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch" }, "product_reference": "kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src" }, "product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64" }, "product_reference": "kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src" }, "product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src" }, "product_reference": "openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch" }, "product_reference": "openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src" }, "product_reference": "openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch" }, "product_reference": "openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch" }, "product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src" }, "product_reference": "openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "perf-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "perf-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "perf-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "perf-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src" }, "product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch" }, "product_reference": "podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64" }, "product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le" }, "product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x" }, "product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64" }, "product_reference": "podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch" }, "product_reference": "python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64" }, "product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le" }, "product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x" }, "product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src" }, "product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64" }, "product_reference": "runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64" }, "product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le" }, "product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x" }, "product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64" }, "product_reference": "runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64" }, "product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le" }, "product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x" }, "product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64" }, "product_reference": "runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64" }, "product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le" }, "product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x" }, "product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src" }, "product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64" }, "product_reference": "skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64" }, "product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le" }, "product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x" }, "product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64" }, "product_reference": "skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "relates_to_product_reference": "8Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64" }, "product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le" }, "product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x" }, "product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src" }, "product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64" }, "product_reference": "buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64" }, "product_reference": "buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64" }, "product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le" }, "product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x" }, "product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64" }, "product_reference": "buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64" }, "product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le" }, "product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x" }, "product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64" }, "product_reference": "buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64" }, "product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le" }, "product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x" }, "product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src" }, "product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64" }, "product_reference": "conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64" }, "product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x" }, "product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64" }, "product_reference": "conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64" }, "product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le" }, "product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x" }, "product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64" }, "product_reference": "conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src" }, "product_reference": "openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64" }, "product_reference": "openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64" }, "product_reference": "openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" }, "product_reference": "openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src" }, "product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch" }, "product_reference": "podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64" }, "product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le" }, "product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x" }, "product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64" }, "product_reference": "podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64" }, "product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le" }, "product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x" }, "product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.src as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src" }, "product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.src", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64" }, "product_reference": "skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64" }, "product_reference": "skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64" }, "product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le" }, "product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x" }, "product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "relates_to_product_reference": "9Base-RHOSE-4.12" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64 as a component of Red Hat OpenShift Container Platform 4.12", "product_id": "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" }, "product_reference": "skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64", "relates_to_product_reference": "9Base-RHOSE-4.12" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2022-32190", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124668" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. The JoinPath doesn\u0027t remove the ../ path components appended to a domain that is not terminated by a slash, possibly leading to a directory traversal attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/url: JoinPath does not strip relative path components in all circumstances", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerable functions, JoinPath and URL.JoinPath was introduced in upstream go1.19, whereas, RHEL ships go1.17 and go1.18 versions, which does not contain the vulnerable code. Hence, packages shipped with RHEL-8, RHEL-9 are not affected.\n\nAll Y stream releases of OpenShift Container Platform 4 run on RHEL-8 or RHEL-9, so OCP 4 is also not affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32190" }, { "category": "external", "summary": "RHBZ#2124668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124668" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32190", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32190" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32190" }, { "category": "external", "summary": "https://go.dev/issue/54385", "url": "https://go.dev/issue/54385" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/url: JoinPath does not strip relative path components in all circumstances" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "known_not_affected": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-06-26T01:19:15+00:00", "details": "For OpenShift Container Platform 4.12 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.12/release_notes/ocp-4-12-release-notes.html", "product_ids": [ "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:3613" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:bpftool-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:buildah-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:conmon-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.src", "8Base-RHOSE-4.12:containernetworking-plugins-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debuginfo-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:containernetworking-plugins-debugsource-0:1.0.1-7.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.src", "8Base-RHOSE-4.12:kernel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-cross-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-core-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debug-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-debuginfo-common-aarch64-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-debuginfo-common-ppc64le-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-debuginfo-common-s390x-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-debuginfo-common-x86_64-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-doc-0:4.18.0-372.59.1.el8_6.noarch", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-headers-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-ipaclones-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-extra-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-modules-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.src", "8Base-RHOSE-4.12:kernel-rt-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-core-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debug-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-devel-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-kvm-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-extra-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-modules-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-rt-selftests-internal-0:4.18.0-372.59.1.rt7.217.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-selftests-internal-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-tools-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:kernel-tools-libs-devel-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:kernel-zfcpdump-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-core-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-devel-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-extra-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:kernel-zfcpdump-modules-internal-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-ansible-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-ansible-test-0:4.12.0-202306090942.p0.g74dc7b3.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.aarch64", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.ppc64le", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.s390x", "8Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el8.x86_64", "8Base-RHOSE-4.12:openshift-kuryr-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.src", "8Base-RHOSE-4.12:openshift-kuryr-cni-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-common-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift-kuryr-controller-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:openshift4-aws-iso-0:4.12.0-202306090942.p0.gd2acdd5.assembly.stream.el8.src", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:podman-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-debugsource-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-docker-3:4.2.0-6.1.rhaos4.12.el8.noarch", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:podman-tests-3:4.2.0-6.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:python3-kuryr-kubernetes-0:4.12.0-202306140156.p0.g31dd228.assembly.stream.el8.noarch", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.aarch64", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.ppc64le", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.s390x", "8Base-RHOSE-4.12:python3-perf-debuginfo-0:4.18.0-372.59.1.el8_6.x86_64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.src", "8Base-RHOSE-4.12:runc-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debuginfo-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:runc-debugsource-3:1.1.6-4.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.src", "8Base-RHOSE-4.12:skopeo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.aarch64", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.ppc64le", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.s390x", "8Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.1.rhaos4.12.el8.x86_64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:buildah-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-debugsource-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:buildah-tests-debuginfo-1:1.23.4-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.src", "9Base-RHOSE-4.12:conmon-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debuginfo-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:conmon-debugsource-2:2.1.2-5.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:openshift-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.src", "9Base-RHOSE-4.12:openshift-clients-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-clients-redistributable-0:4.12.0-202306090942.p0.g3c01edd.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.aarch64", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.ppc64le", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.s390x", "9Base-RHOSE-4.12:openshift-hyperkube-0:4.12.0-202306121916.p0.g8c21020.assembly.stream.el9.x86_64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.src", "9Base-RHOSE-4.12:podman-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-catatonit-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-debugsource-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-docker-3:4.2.0-7.rhaos4.12.el9.noarch", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-gvproxy-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-plugins-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-remote-debuginfo-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:podman-tests-3:4.2.0-7.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.src", "9Base-RHOSE-4.12:skopeo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debuginfo-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-debugsource-2:1.9.4-3.rhaos4.12.el9.x86_64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.aarch64", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.ppc64le", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.s390x", "9Base-RHOSE-4.12:skopeo-tests-2:1.9.4-3.rhaos4.12.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" } ] }
rhsa-2024_2077
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nSecurity team has rated the vulnerability impact of the fixed issues as Important.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\n* podman: Symlink error leads to information disclosure (CVE-2022-4122)\n\n* buildah: full container escape at build time (CVE-2024-1753)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:2077", "url": "https://access.redhat.com/errata/RHSA-2024:2077" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "2144983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983" }, { "category": "external", "summary": "2265513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2077.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security and bug fix update", "tracking": { "current_release_date": "2024-12-17T22:40:09+00:00", "generator": { "date": "2024-12-17T22:40:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:2077", "initial_release_date": "2024-04-29T12:00:29+00:00", "revision_history": [ { "date": "2024-04-29T12:00:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-29T12:00:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:40:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8080020240422101606:0f77c1b7", "product": { "name": "container-tools:rhel8:8080020240422101606:0f77c1b7", "product_id": "container-tools:rhel8:8080020240422101606:0f77c1b7", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8080020240422101606:0f77c1b7" } } }, { "category": "product_version", "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product": { "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_id": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "product": { "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_id": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "product": { "name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "product_id": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product": { "name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_id": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "product": { "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "product_id": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@63.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.229.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=3" } } }, { "category": "product_version", "name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman@4.4.1-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src", "product": { "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src", "product_id": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.5.0-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.29.3-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.6-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.2.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-65.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.8.4-2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.11-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.5.1-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.8-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.4.1-19.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=3" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-4.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.11.2-0.2.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_id": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-7.module%2Bel8.8.0%2B21741%2Bdd5be1e7?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, "product_reference": "container-tools:rhel8:8080020240422101606:0f77c1b7", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch" }, "product_reference": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch" }, "product_reference": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch" }, "product_reference": "podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch" }, "product_reference": "python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64" }, "product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le" }, "product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x" }, "product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64 as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64" }, "product_reference": "toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch" }, "product_reference": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src as a component of container-tools:rhel8:8080020240422101606:0f77c1b7 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)", "product_id": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" }, "product_reference": "udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src", "relates_to_product_reference": "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-4122", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2022-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2144983" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in buildah and podman. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "podman: Symlink error leads to information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "These bugs come about when \"podman --remote build ...\" is run, thus affecting buildah, but the bug itself needs to be fixed in podman, and ported to Buildah.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-4122" }, { "category": "external", "summary": "RHBZ#2144983", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2144983" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4122", "url": "https://www.cve.org/CVERecord?id=CVE-2022-4122" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4122" }, { "category": "external", "summary": "https://github.com/containers/podman/pull/16315", "url": "https://github.com/containers/podman/pull/16315" } ], "release_date": "2022-11-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:00:29+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "podman: Symlink error leads to information disclosure" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:00:29+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2077" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "cve": "CVE-2024-1753", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "discovery_date": "2024-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2265513" } ], "notes": [ { "category": "description", "text": "A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.", "title": "Vulnerability description" }, { "category": "summary", "text": "buildah: full container escape at build time", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-1753" }, { "category": "external", "summary": "RHBZ#2265513", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265513" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-1753", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1753" }, { "category": "external", "summary": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf", "url": "https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf" }, { "category": "external", "summary": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3", "url": "https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3" }, { "category": "external", "summary": "https://pkg.go.dev/vuln/GO-2024-2658", "url": "https://pkg.go.dev/vuln/GO-2024-2658" } ], "release_date": "2024-03-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-29T12:00:29+00:00", "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:2077" }, { "category": "workaround", "details": "When SELinux is enabled, the container is restricted to limited read-only access.", "product_ids": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:aardvark-dns-2:1.5.0-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-debugsource-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:buildah-tests-debuginfo-1:1.29.3-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:cockpit-podman-0:63.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debuginfo-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:conmon-debugsource-3:2.1.6-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:container-selinux-2:2.229.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debuginfo-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containernetworking-plugins-debugsource-1:1.2.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:containers-common-2:1-65.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crit-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-debugsource-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-devel-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:criu-libs-debuginfo-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debuginfo-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:crun-debugsource-0:1.8.4-2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debuginfo-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:fuse-overlayfs-debugsource-0:1.11-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debuginfo-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-debugsource-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:libslirp-devel-0:4.4.0-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:netavark-2:1.5.1-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debuginfo-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:oci-seccomp-bpf-hook-debugsource-0:1.2.8-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-catatonit-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-debugsource-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-docker-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-gvproxy-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-plugins-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-remote-debuginfo-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:podman-tests-3:4.4.1-19.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-criu-0:3.15-4.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:python3-podman-0:4.4.1-1.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debuginfo-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:runc-debugsource-1:1.1.12-1.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:skopeo-tests-2:1.11.2-0.2.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debuginfo-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:slirp4netns-debugsource-0:1.2.0-3.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.src", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debuginfo-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-debugsource-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.aarch64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.ppc64le", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.s390x", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:toolbox-tests-0:0.0.99.3-7.module+el8.8.0+21741+dd5be1e7.x86_64", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.noarch", "AppStream-8.8.0.Z.EUS:container-tools:rhel8:8080020240422101606:0f77c1b7:udica-0:0.2.6-20.module+el8.8.0+21741+dd5be1e7.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "buildah: full container escape at build time" } ] }
rhsa-2024_1994
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* podman: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:1994", "url": "https://access.redhat.com/errata/RHSA-2024:1994" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1994.json" } ], "title": "Red Hat Security Advisory: container-tools:rhel8 security update", "tracking": { "current_release_date": "2024-12-17T22:39:55+00:00", "generator": { "date": "2024-12-17T22:39:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2024:1994", "initial_release_date": "2024-04-23T14:16:09+00:00", "revision_history": [ { "date": "2024-04-23T14:16:09+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-04-23T14:16:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:39:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "container-tools:rhel8:8060020240413110723:3b538bd8", "product": { "name": "container-tools:rhel8:8060020240413110723:3b538bd8", "product_id": "container-tools:rhel8:8060020240413110723:3b538bd8", "product_identification_helper": { "purl": "pkg:rpmmod/redhat/container-tools@rhel8:8060020240413110723:3b538bd8" } } }, { "category": "product_version", "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product": { "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_id": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch" } } }, { "category": "product_version", "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "product": { "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_id": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "product": { "name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "product_id": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-docker@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=noarch\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product": { "name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_id": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch" } } }, { "category": "product_version", "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "product": { "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "product_id": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/cockpit-podman@49.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/container-selinux@2.189.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "product": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-podman@4.0.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } }, { "category": "product_version", "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src", "product": { "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src", "product_id": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/udica@0.2.6-5.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/aardvark-dns@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-debugsource@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.26.2-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/conmon-debugsource@2.1.4-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.1.1-4.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/containers-common@1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crit@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-debugsource@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-devel@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debuginfo@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/crun-debugsource@1.5-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.9-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/netavark@1.0.1-40.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.6-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-debugsource@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_id": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/podman-tests@4.2.0-2.module%2Bel8.6.0%2B21674%2B8010760f?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-criu@3.15-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=1" } } }, { "category": "product_version", "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debuginfo@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-debugsource@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/skopeo-tests@1.9.1-1.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64\u0026epoch=2" } } }, { "category": "product_version", "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.0-3.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } }, { "category": "product_version", "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_id": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.3-0.7.module%2Bel8.6.0%2B21266%2B3e24c7b3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, "product_reference": "container-tools:rhel8:8060020240413110723:3b538bd8", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch" }, "product_reference": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch" }, "product_reference": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src" }, "product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch" }, "product_reference": "podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64" }, "product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le" }, "product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x" }, "product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64" }, "product_reference": "podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch" }, "product_reference": "python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64 as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64" }, "product_reference": "toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch" }, "product_reference": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" }, { "category": "default_component_of", "full_product_name": { "name": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src as a component of container-tools:rhel8:8060020240413110723:3b538bd8 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src" }, "product_reference": "udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-04-23T14:16:09+00:00", "details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:1994" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:aardvark-dns-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-debugsource-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:buildah-tests-debuginfo-1:1.26.2-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:cockpit-podman-0:49.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debuginfo-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:conmon-debugsource-2:2.1.4-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:container-selinux-2:2.189.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debuginfo-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containernetworking-plugins-debugsource-1:1.1.1-4.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:containers-common-2:1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crit-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-debugsource-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-devel-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:criu-libs-debuginfo-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debuginfo-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:crun-debugsource-0:1.5-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debuginfo-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:fuse-overlayfs-debugsource-0:1.9-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debuginfo-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-debugsource-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:libslirp-devel-0:4.4.0-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:netavark-2:1.0.1-40.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debuginfo-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:oci-seccomp-bpf-hook-debugsource-0:1.2.6-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-catatonit-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-debugsource-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-docker-2:4.2.0-2.module+el8.6.0+21674+8010760f.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-gvproxy-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-plugins-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-remote-debuginfo-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:podman-tests-2:4.2.0-2.module+el8.6.0+21674+8010760f.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-criu-0:3.15-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:python3-podman-0:4.0.1-1.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debuginfo-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:runc-debugsource-1:1.1.12-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debuginfo-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-debugsource-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:skopeo-tests-2:1.9.1-1.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debuginfo-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:slirp4netns-debugsource-0:1.2.0-3.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.src", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debuginfo-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-debugsource-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.aarch64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.ppc64le", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.s390x", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:toolbox-tests-0:0.0.99.3-0.7.module+el8.6.0+21266+3e24c7b3.x86_64", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.noarch", "AppStream-8.6.0.Z.EUS:container-tools:rhel8:8060020240413110723:3b538bd8:udica-0:0.2.6-5.module+el8.6.0+21266+3e24c7b3.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" } ] }
rhsa-2023_1042
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Custom Metrics Autoscaler Operator for Red Hat OpenShift including security updates.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Custom Metrics Autoscaler Operator for Red Hat OpenShift is an optional\noperator, based on the Kubernetes Event Driven Autoscaler (KEDA), that allows workloads to be scaled using additional metrics sources other than pod metrics.\nThis release builds upon updated compiler, runtime library, and base images for the purpose of resolving any potential security issues present in previous toolset versions.\n\nThis version makes use of newer tools and libraries to address the following issues:\ngolang: net/http: improper sanitization of Transfer-Encoding header (CVE-2022-1705)\ngolang: go/parser: stack exhaustion in all Parse* functions (CVE-2022-1962)\ngolang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\ngolang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\ngolang: net/http: handle server errors after sending GOAWAY (CVE-2022-27664)\ngolang: encoding/xml: stack exhaustion in Decoder.Skip (CVE-2022-28131)\ngolang: crypto/elliptic: panic caused by oversized scalar (CVE-2022-28327)\ngolang: io/fs: stack exhaustion in Glob (CVE-2022-30630)\ngolang: compress/gzip: stack exhaustion in Reader.Read (CVE-2022-30631)\ngolang: path/filepath: stack exhaustion in Glob (CVE-2022-30632)\ngolang: encoding/xml: stack exhaustion in Unmarshal (CVE-2022-30633)\ngolang: encoding/gob: stack exhaustion in Decoder.Decode (CVE-2022-30635)\ngolang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working (CVE-2022-32148)\ngolang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags (CVE-2022-32149)\ngolang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:1042", "url": "https://access.redhat.com/errata/RHSA-2023:1042" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "2100763", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2100763" }, { "category": "external", "summary": "2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "2113945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2113945" }, { "category": "external", "summary": "2118404", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2118404" }, { "category": "external", "summary": "2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "OCPNODE-1260", "url": "https://issues.redhat.com/browse/OCPNODE-1260" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1042.json" } ], "title": "Red Hat Security Advisory: Custom Metrics Autoscaler Operator for Red Hat OpenShift (with security updates)", "tracking": { "current_release_date": "2024-12-17T22:13:24+00:00", "generator": { "date": "2024-12-17T22:13:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2023:1042", "initial_release_date": "2023-03-06T18:38:53+00:00", "revision_history": [ { "date": "2023-03-06T18:38:53+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-03-06T18:38:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-17T22:13:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "OpenShift Custom Metrics Autoscaler 2", "product": { "name": "OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift_custom_metrics_autoscaler:2.0::el8" } } } ], "category": "product_family", "name": "OpenShift Custom Metrics Autoscaler" }, { "branches": [ { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle\u0026tag=2.8.2-143" } } }, { "category": "product_version", "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product_id": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "product_identification_helper": { "purl": "pkg:oci/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293?arch=amd64\u0026repository_url=registry.redhat.io/custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator\u0026tag=2.8.2-143" } } } ], "category": "architecture", "name": "amd64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "relates_to_product_reference": "8Base-OCMA-2" }, { "category": "default_component_of", "full_product_name": { "name": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64 as a component of OpenShift Custom Metrics Autoscaler 2", "product_id": "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" }, "product_reference": "custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64", "relates_to_product_reference": "8Base-OCMA-2" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107374" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. The HTTP/1 client accepted invalid Transfer-Encoding headers indicating \"chunked\" encoding. This issue could allow request smuggling, but only if combined with an intermediate server that also improperly accepts the header as invalid.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: improper sanitization of Transfer-Encoding header", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1705" }, { "category": "external", "summary": "RHBZ#2107374", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107374" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1705" }, { "category": "external", "summary": "https://go.dev/issue/53188", "url": "https://go.dev/issue/53188" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: net/http: improper sanitization of Transfer-Encoding header" }, { "cve": "CVE-2022-1962", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107376" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, go/parser. When calling any Parse functions on the Go source code, which contains deeply nested types or declarations, a panic can occur due to stack exhaustion. This issue allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: go/parser: stack exhaustion in all Parse* functions", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-1962" }, { "category": "external", "summary": "RHBZ#2107376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-1962", "url": "https://www.cve.org/CVERecord?id=CVE-2022-1962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1962" }, { "category": "external", "summary": "https://go.dev/issue/53616", "url": "https://go.dev/issue/53616" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: go/parser: stack exhaustion in all Parse* functions" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-2879", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132867" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: archive/tar: unbounded memory consumption when reading headers", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2879" }, { "category": "external", "summary": "RHBZ#2132867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54853", "url": "https://github.com/golang/go/issues/54853" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: archive/tar: unbounded memory consumption when reading headers" }, { "acknowledgments": [ { "names": [ "Daniel Abeles" ], "organization": "Head of Research, Oxeye" }, { "names": [ "Gal Goldstein" ], "organization": "Security Researcher, Oxeye" } ], "cve": "CVE-2022-2880", "cwe": { "id": "CWE-444", "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)" }, "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132868" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-2880" }, { "category": "external", "summary": "RHBZ#2132868", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880", "url": "https://www.cve.org/CVERecord?id=CVE-2022-2880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880" }, { "category": "external", "summary": "https://github.com/golang/go/issues/54663", "url": "https://github.com/golang/go/issues/54663" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters" }, { "cve": "CVE-2022-27664", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2022-09-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2124669" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package. In net/http in Go, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if a fatal error preempts the shutdown.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http: handle server errors after sending GOAWAY", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-27664" }, { "category": "external", "summary": "RHBZ#2124669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2124669" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-27664", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27664" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-27664" }, { "category": "external", "summary": "https://go.dev/issue/54658", "url": "https://go.dev/issue/54658" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ", "url": "https://groups.google.com/g/golang-announce/c/x49AQzIVX-s/m/0tgO0pjiBQAJ" } ], "release_date": "2022-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http: handle server errors after sending GOAWAY" }, { "cve": "CVE-2022-28131", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107390" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang encoding/xml. When calling Decoder, Skip while parsing a deeply nested XML document, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Decoder.Skip", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28131" }, { "category": "external", "summary": "RHBZ#2107390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107390" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28131", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28131" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28131" }, { "category": "external", "summary": "https://go.dev/issue/53614", "url": "https://go.dev/issue/53614" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/xml: stack exhaustion in Decoder.Skip" }, { "cve": "CVE-2022-28327", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-04-21T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2077689" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in Golang\u0027s crypto/elliptic library. This flaw allows an attacker to use a crafted scaler input longer than 32 bytes, causing P256().ScalarMult or P256().ScalarBaseMult to panic, leading to a loss of availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: crypto/elliptic: panic caused by oversized scalar", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 7, 8 and 9 are affected, because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 7, hence, marked as Out-of-Support-Scope. \n\nRed Hat Developer Tools - Compilers (go-toolset-1.16-golang \u0026 go-toolset-1.17-golang), ships the vulnerable code and affected by this vulnerability.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-28327" }, { "category": "external", "summary": "RHBZ#2077689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-28327", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28327" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-28327" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8", "url": "https://groups.google.com/g/golang-announce/c/oecdBNLOml8" } ], "release_date": "2022-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "golang: crypto/elliptic: panic caused by oversized scalar" }, { "cve": "CVE-2022-30630", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107371" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang standard library, io/fs. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This could allow an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: io/fs: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30630" }, { "category": "external", "summary": "RHBZ#2107371", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107371" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30630", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30630" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30630" }, { "category": "external", "summary": "https://go.dev/issue/53415", "url": "https://go.dev/issue/53415" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: io/fs: stack exhaustion in Glob" }, { "cve": "CVE-2022-30631", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107342" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling the Reader, Read method on an archive that contains a large number of concatenated 0-length compressed files can cause a panic issue due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: compress/gzip: stack exhaustion in Reader.Read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30631" }, { "category": "external", "summary": "RHBZ#2107342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107342" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30631", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30631" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30631" }, { "category": "external", "summary": "https://go.dev/issue/53168", "url": "https://go.dev/issue/53168" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: compress/gzip: stack exhaustion in Reader.Read" }, { "cve": "CVE-2022-30632", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107386" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Glob on a path that contains a large number of path separators can cause a panic issue due to stack exhaustion. This can cause an attacker to impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: path/filepath: stack exhaustion in Glob", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30632" }, { "category": "external", "summary": "RHBZ#2107386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30632", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30632" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30632" }, { "category": "external", "summary": "https://go.dev/issue/53416", "url": "https://go.dev/issue/53416" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: path/filepath: stack exhaustion in Glob" }, { "cve": "CVE-2022-30633", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107392" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. Calling Unmarshal on an XML document into a Go struct, which has a nested field that uses the \"any\" field tag, can cause a panic due to stack exhaustion.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/xml: stack exhaustion in Unmarshal", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30633" }, { "category": "external", "summary": "RHBZ#2107392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30633", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30633" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30633" }, { "category": "external", "summary": "https://go.dev/issue/53611", "url": "https://go.dev/issue/53611" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/xml: stack exhaustion in Unmarshal" }, { "cve": "CVE-2022-30635", "cwe": { "id": "CWE-1325", "name": "Improperly Controlled Sequential Memory Allocation" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107388" } ], "notes": [ { "category": "description", "text": "A flaw was found in golang. When calling Decoder, Decode on a message that contains deeply nested structures, a panic can occur due to stack exhaustion and allows an attacker to impact system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: encoding/gob: stack exhaustion in Decoder.Decode", "title": "Vulnerability summary" }, { "category": "other", "text": "OpenShift Container Platform (OCP) starting from 4.10 stream is already compiled in the patched version of Go, hence is not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30635" }, { "category": "external", "summary": "RHBZ#2107388", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107388" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30635", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30635" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30635" }, { "category": "external", "summary": "https://go.dev/issue/53615", "url": "https://go.dev/issue/53615" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: encoding/gob: stack exhaustion in Decoder.Decode" }, { "cve": "CVE-2022-32148", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-14T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2107383" } ], "notes": [ { "category": "description", "text": "A flaw was found in net/http/httputil golang package. When httputil.ReverseProxy.ServeHTTP is called with a Request.Header map containing a nil value for the X-Forwarded-For header, ReverseProxy could set the client IP incorrectly. This issue may affect confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32148" }, { "category": "external", "summary": "RHBZ#2107383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2107383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32148", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32148" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32148" }, { "category": "external", "summary": "https://go.dev/issue/53423", "url": "https://go.dev/issue/53423" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE", "url": "https://groups.google.com/g/golang-announce/c/nqrv9fbR0zE" } ], "release_date": "2022-07-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: net/http/httputil: NewSingleHostReverseProxy - omit X-Forwarded-For not working" }, { "cve": "CVE-2022-32149", "cwe": { "id": "CWE-407", "name": "Inefficient Algorithmic Complexity" }, "discovery_date": "2022-10-12T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2134010" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the golang.org/x/text/language package. An attacker can craft an Accept-Language header which ParseAcceptLanguage will take significant time to parse. This issue leads to a denial of service, and can impact availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32149" }, { "category": "external", "summary": "RHBZ#2134010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2134010" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32149", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32149" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "category": "external", "summary": "https://go.dev/issue/56152", "url": "https://go.dev/issue/56152" }, { "category": "external", "summary": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU", "url": "https://groups.google.com/g/golang-dev/c/qfPIly0X7aU" } ], "release_date": "2022-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags" }, { "acknowledgments": [ { "names": [ "Adam Korczynski" ], "organization": "ADA Logics" }, { "names": [ "OSS-Fuzz" ] } ], "cve": "CVE-2022-41715", "discovery_date": "2022-10-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2132872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.", "title": "Vulnerability description" }, { "category": "summary", "text": "golang: regexp/syntax: limit memory used by parsing regexps", "title": "Vulnerability summary" }, { "category": "other", "text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "known_not_affected": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-41715" }, { "category": "external", "summary": "RHBZ#2132872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715", "url": "https://www.cve.org/CVERecord?id=CVE-2022-41715" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715" }, { "category": "external", "summary": "https://github.com/golang/go/issues/55949", "url": "https://github.com/golang/go/issues/55949" }, { "category": "external", "summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1", "url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1" } ], "release_date": "2022-10-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-03-06T18:38:53+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:1042" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-adapter-rhel8@sha256:c79cb3c68317a224277a8ee0dc78832fcd4b6da18b9b5b074cffaad14e2f1aa5_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-operator-bundle@sha256:44de4b736089166718956bebd456ad1a17e0e6f72c49f52804c6b6e60ef5a494_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8-operator@sha256:5a149d0a0cdb6812acbef0c9b3031fb3cd84181e971198a6e17d8fd0bf5e6293_amd64", "8Base-OCMA-2:custom-metrics-autoscaler-tech-preview/custom-metrics-autoscaler-rhel8@sha256:a403d057cd2ca820306207282007d4d117623e1a2ebb8bee67c19f5796f07f95_amd64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "golang: regexp/syntax: limit memory used by parsing regexps" } ] }
wid-sec-w-2023-0210
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux in der Komponente Submariner ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0210 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0210.json" }, { "category": "self", "summary": "WID-SEC-2023-0210 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0210" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0481 vom 2023-01-26", "url": "https://access.redhat.com/errata/RHSA-2023:0481" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0692 vom 2023-02-09", "url": "https://access.redhat.com/errata/RHSA-2023:0692" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0795 vom 2023-02-16", "url": "https://access.redhat.com/errata/RHSA-2023:0795" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASDOCKER-2024-035 vom 2024-01-24", "url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-035.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27", "url": "https://access.redhat.com/errata/RHSA-2023:3613" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2077 vom 2024-04-29", "url": "https://access.redhat.com/errata/RHSA-2024:2077" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux (Submariner): Schwachstelle erm\u00f6glicht Denial of Service", "tracking": { "current_release_date": "2024-04-28T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:42:38.391+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0210", "initial_release_date": "2023-01-26T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-26T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-08T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-26T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-24T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-04-28T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "6" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "branches": [ { "category": "product_version_range", "name": "Container Platform \u003c4.12.22", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.12.22", "product_id": "T028307" } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"Submariner\" bzw. in dessen Modul \"Golang\" und ist auf einen Fehler beim Verarbeiten von bestimmten Headern zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "67646", "T028307", "398363", "T014111" ] }, "release_date": "2023-01-26T23:00:00.000+00:00", "title": "CVE-2022-32149" } ] }
wid-sec-w-2023-2229
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentifizierter Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen, seine Privilegien zu erweitern und weitere, nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- MacOS X\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2229 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2229.json" }, { "category": "self", "summary": "WID-SEC-2023-2229 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2229" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0801" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0802" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0803" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0804" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0805" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0806" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0807" }, { "category": "external", "summary": "Splunk Security Advisory vom 2023-08-30", "url": "https://advisory.splunk.com//advisories/SVD-2023-0808" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:0196-1 vom 2024-01-23", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-January/017743.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28", "url": "https://linux.oracle.com/errata/ELSA-2024-2988.html" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02", "url": "https://advisory.splunk.com/advisories/SVD-2024-0718" }, { "category": "external", "summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12", "url": "https://advisory.splunk.com//advisories/SVD-2024-0801" } ], "source_lang": "en-US", "title": "Splunk Splunk Enterprise: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-08-12T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:57:53.670+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2229", "initial_release_date": "2023-08-30T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-30T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-23T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-05-28T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-07-01T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Splunk-SVD aufgenommen" }, { "date": "2024-08-12T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Splunk-SVD aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Splunk Splunk Enterprise", "product": { "name": "Splunk Splunk Enterprise", "product_id": "T008911", "product_identification_helper": { "cpe": "cpe:/a:splunk:splunk:-" } } }, { "category": "product_version_range", "name": "\u003c9.1.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.1", "product_id": "T029634" } }, { "category": "product_version_range", "name": "\u003c9.0.6", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.6", "product_id": "T029635" } }, { "category": "product_version_range", "name": "\u003c8.2.12", "product": { "name": "Splunk Splunk Enterprise \u003c8.2.12", "product_id": "T029636" } }, { "category": "product_version_range", "name": "\u003c9.2.1", "product": { "name": "Splunk Splunk Enterprise \u003c9.2.1", "product_id": "T033705" } }, { "category": "product_version_range", "name": "\u003c9.1.4", "product": { "name": "Splunk Splunk Enterprise \u003c9.1.4", "product_id": "T033718" } }, { "category": "product_version_range", "name": "\u003c9.0.9", "product": { "name": "Splunk Splunk Enterprise \u003c9.0.9", "product_id": "T033720" } } ], "category": "product_name", "name": "Splunk Enterprise" } ], "category": "vendor", "name": "Splunk" } ] }, "vulnerabilities": [ { "cve": "CVE-2013-7489", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2013-7489" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-20225", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2018-20225" }, { "cve": "CVE-2019-20454", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2019-20454" }, { "cve": "CVE-2019-20838", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2019-20838" }, { "cve": "CVE-2020-14155", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-14155" }, { "cve": "CVE-2020-28469", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-28469" }, { "cve": "CVE-2020-28851", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-28851" }, { "cve": "CVE-2020-29652", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-29652" }, { "cve": "CVE-2020-8169", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8169" }, { "cve": "CVE-2020-8177", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8177" }, { "cve": "CVE-2020-8231", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8231" }, { "cve": "CVE-2020-8284", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8284" }, { "cve": "CVE-2020-8285", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8285" }, { "cve": "CVE-2020-8286", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8286" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2021-20066", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-20066" }, { "cve": "CVE-2021-22569", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22569" }, { "cve": "CVE-2021-22876", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22876" }, { "cve": "CVE-2021-22890", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22890" }, { "cve": "CVE-2021-22897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22897" }, { "cve": "CVE-2021-22898", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22898" }, { "cve": "CVE-2021-22901", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22901" }, { "cve": "CVE-2021-22922", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22922" }, { "cve": "CVE-2021-22923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22923" }, { "cve": "CVE-2021-22924", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22924" }, { "cve": "CVE-2021-22925", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22925" }, { "cve": "CVE-2021-22926", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22926" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22945" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-23343", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-23343" }, { "cve": "CVE-2021-23382", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-23382" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-27919", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-27919" }, { "cve": "CVE-2021-29060", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29060" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-29923", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-29923" }, { "cve": "CVE-2021-31525", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-31525" }, { "cve": "CVE-2021-31566", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-31566" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33198", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-33198" }, { "cve": "CVE-2021-34558", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-34558" }, { "cve": "CVE-2021-3520", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3520" }, { "cve": "CVE-2021-3572", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3572" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-3803", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-3803" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-38561", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-38561" }, { "cve": "CVE-2021-39293", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-39293" }, { "cve": "CVE-2021-41182", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41182" }, { "cve": "CVE-2021-41183", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41183" }, { "cve": "CVE-2021-41184", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41184" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-41772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-41772" }, { "cve": "CVE-2021-43565", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-43565" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44717", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2021-44717" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1941", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1941" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-22576", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-22576" }, { "cve": "CVE-2022-2309", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2309" }, { "cve": "CVE-2022-23491", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23491" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-23806", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-23806" }, { "cve": "CVE-2022-24675", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24675" }, { "cve": "CVE-2022-24921", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24921" }, { "cve": "CVE-2022-24999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-24999" }, { "cve": "CVE-2022-25881", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-25881" }, { "cve": "CVE-2022-27191", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27191" }, { "cve": "CVE-2022-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27536" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-27774", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27774" }, { "cve": "CVE-2022-27775", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27775" }, { "cve": "CVE-2022-27776", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27776" }, { "cve": "CVE-2022-27778", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27778" }, { "cve": "CVE-2022-27779", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27779" }, { "cve": "CVE-2022-27780", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27780" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29804", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-29804" }, { "cve": "CVE-2022-30115", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30115" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30629", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30629" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30634", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30634" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-3171", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3171" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32205", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32205" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32207", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32207" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-33987", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-33987" }, { "cve": "CVE-2022-3509", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3509" }, { "cve": "CVE-2022-3510", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3510" }, { "cve": "CVE-2022-3517", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-3517" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-35260", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35260" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-36227", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-36227" }, { "cve": "CVE-2022-37599", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37599" }, { "cve": "CVE-2022-37601", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37601" }, { "cve": "CVE-2022-37603", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-37603" }, { "cve": "CVE-2022-38900", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-38900" }, { "cve": "CVE-2022-40023", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40023" }, { "cve": "CVE-2022-40897", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40897" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41716", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41716" }, { "cve": "CVE-2022-41720", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41720" }, { "cve": "CVE-2022-41722", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-41722" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42915" }, { "cve": "CVE-2022-42916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-42916" }, { "cve": "CVE-2022-43551", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-43551" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-46175", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2022-46175" }, { "cve": "CVE-2023-23914", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23914" }, { "cve": "CVE-2023-23915", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23915" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-24539", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-24539" }, { "cve": "CVE-2023-24540", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-24540" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27537", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27537" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-29400", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29400" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29403", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29403" }, { "cve": "CVE-2023-29404", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29404" }, { "cve": "CVE-2023-29405", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Third Party Packages in Splunk Splunk Enterprise. Diese Fehler existieren unter anderem in den curl, go, decode-uri-Komponente, got, loader-utils, postcss, color-string, glob-parent, minimatch und moment Komponenten. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen nicht spezifizierten Angriff durchzuf\u00fchren." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-29405" }, { "cve": "CVE-2023-40592", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40592" }, { "cve": "CVE-2023-40593", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40593" }, { "cve": "CVE-2023-40594", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40594" }, { "cve": "CVE-2023-40595", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40595" }, { "cve": "CVE-2023-40596", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40596" }, { "cve": "CVE-2023-40597", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40597" }, { "cve": "CVE-2023-40598", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Splunk Splunk Enterprise. Diese Fehler bestehen in den REST-Endpunkten /app/search/table, /saml/acs, Serialized Session Payload, Dynamic Link Library, runshellscript.py und in den runshellscript-Komponenten sowie in der SPL-Funktion \u0027printf\u0027, u. a. aufgrund eines reflektierten Cross-Site-Scripting (XSS), einer unsachgem\u00e4\u00dfen Signaturvalidierung, einer unsachgem\u00e4\u00dfen Ausdrucksvalidierung und eines Path Traversal. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, einen \u0027Denial of Service\u0027-Zustand zu verursachen und seine Privilegien zu erweitern." } ], "product_status": { "known_affected": [ "T033720", "T002207", "T008911", "T033718", "T033705", "T004914" ] }, "release_date": "2023-08-30T22:00:00.000+00:00", "title": "CVE-2023-40598" } ] }
wid-sec-w-2024-0794
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Dell ECS ist ein Objektspeichersystem.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0794 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json" }, { "category": "self", "summary": "WID-SEC-2024-0794 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794" }, { "category": "external", "summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04", "url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-=" } ], "source_lang": "en-US", "title": "Dell ECS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-27T23:00:00.000+00:00", "generator": { "date": "2024-11-28T11:39:04.623+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-0794", "initial_release_date": "2024-04-04T22:00:00.000+00:00", "revision_history": [ { "date": "2024-04-04T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-11-27T23:00:00.000+00:00", "number": "2", "summary": "Produktzuordnung \u00fcberpr\u00fcft" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c3.8.1.0", "product": { "name": "Dell ECS \u003c3.8.1.0", "product_id": "T033919" } }, { "category": "product_version", "name": "3.8.1.0", "product": { "name": "Dell ECS 3.8.1.0", "product_id": "T033919-fixed", "product_identification_helper": { "cpe": "cpe:/h:dell:ecs:3.8.1.0" } } } ], "category": "product_name", "name": "ECS" } ], "category": "vendor", "name": "Dell" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-18074", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2018-18074" }, { "cve": "CVE-2020-10663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10663" }, { "cve": "CVE-2020-10672", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10672" }, { "cve": "CVE-2020-10673", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10673" }, { "cve": "CVE-2020-10735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10735" }, { "cve": "CVE-2020-10968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10968" }, { "cve": "CVE-2020-10969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-10969" }, { "cve": "CVE-2020-11111", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11111" }, { "cve": "CVE-2020-11112", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11112" }, { "cve": "CVE-2020-11113", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11113" }, { "cve": "CVE-2020-11612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11612" }, { "cve": "CVE-2020-11619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11619" }, { "cve": "CVE-2020-11620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11620" }, { "cve": "CVE-2020-11979", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-11979" }, { "cve": "CVE-2020-12762", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12762" }, { "cve": "CVE-2020-12825", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-12825" }, { "cve": "CVE-2020-13956", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-13956" }, { "cve": "CVE-2020-14060", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14060" }, { "cve": "CVE-2020-14061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14061" }, { "cve": "CVE-2020-14062", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14062" }, { "cve": "CVE-2020-14195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-14195" }, { "cve": "CVE-2020-15250", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-15250" }, { "cve": "CVE-2020-1945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1945" }, { "cve": "CVE-2020-1967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1967" }, { "cve": "CVE-2020-1971", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-1971" }, { "cve": "CVE-2020-24616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24616" }, { "cve": "CVE-2020-24750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-24750" }, { "cve": "CVE-2020-25649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25649" }, { "cve": "CVE-2020-25658", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-25658" }, { "cve": "CVE-2020-26116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26116" }, { "cve": "CVE-2020-26137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26137" }, { "cve": "CVE-2020-26541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-26541" }, { "cve": "CVE-2020-27216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27216" }, { "cve": "CVE-2020-27218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27218" }, { "cve": "CVE-2020-27223", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-27223" }, { "cve": "CVE-2020-28366", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28366" }, { "cve": "CVE-2020-28493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-28493" }, { "cve": "CVE-2020-29509", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29509" }, { "cve": "CVE-2020-29511", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29511" }, { "cve": "CVE-2020-29582", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29582" }, { "cve": "CVE-2020-29651", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-29651" }, { "cve": "CVE-2020-35490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35490" }, { "cve": "CVE-2020-35491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35491" }, { "cve": "CVE-2020-35728", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-35728" }, { "cve": "CVE-2020-36179", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36179" }, { "cve": "CVE-2020-36180", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36180" }, { "cve": "CVE-2020-36181", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36181" }, { "cve": "CVE-2020-36182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36182" }, { "cve": "CVE-2020-36183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36183" }, { "cve": "CVE-2020-36184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36184" }, { "cve": "CVE-2020-36185", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36185" }, { "cve": "CVE-2020-36186", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36186" }, { "cve": "CVE-2020-36187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36187" }, { "cve": "CVE-2020-36188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36188" }, { "cve": "CVE-2020-36189", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36189" }, { "cve": "CVE-2020-36516", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36516" }, { "cve": "CVE-2020-36518", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36518" }, { "cve": "CVE-2020-36557", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36557" }, { "cve": "CVE-2020-36558", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36558" }, { "cve": "CVE-2020-36691", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-36691" }, { "cve": "CVE-2020-7238", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-7238" }, { "cve": "CVE-2020-8840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8840" }, { "cve": "CVE-2020-8908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8908" }, { "cve": "CVE-2020-8911", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8911" }, { "cve": "CVE-2020-8912", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-8912" }, { "cve": "CVE-2020-9488", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9488" }, { "cve": "CVE-2020-9493", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9493" }, { "cve": "CVE-2020-9546", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9546" }, { "cve": "CVE-2020-9547", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9547" }, { "cve": "CVE-2020-9548", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2020-9548" }, { "cve": "CVE-2021-20190", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20190" }, { "cve": "CVE-2021-20323", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-20323" }, { "cve": "CVE-2021-21290", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21290" }, { "cve": "CVE-2021-21295", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21295" }, { "cve": "CVE-2021-21409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-21409" }, { "cve": "CVE-2021-23840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23840" }, { "cve": "CVE-2021-23841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-23841" }, { "cve": "CVE-2021-2471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-2471" }, { "cve": "CVE-2021-25642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-25642" }, { "cve": "CVE-2021-26341", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-26341" }, { "cve": "CVE-2021-27918", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-27918" }, { "cve": "CVE-2021-28153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28153" }, { "cve": "CVE-2021-28165", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28165" }, { "cve": "CVE-2021-28169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28169" }, { "cve": "CVE-2021-28861", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-28861" }, { "cve": "CVE-2021-29425", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-29425" }, { "cve": "CVE-2021-30560", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-30560" }, { "cve": "CVE-2021-3114", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3114" }, { "cve": "CVE-2021-33036", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33036" }, { "cve": "CVE-2021-33194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33194" }, { "cve": "CVE-2021-33195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33195" }, { "cve": "CVE-2021-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33196" }, { "cve": "CVE-2021-33197", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33197" }, { "cve": "CVE-2021-33503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33503" }, { "cve": "CVE-2021-33655", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33655" }, { "cve": "CVE-2021-33656", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-33656" }, { "cve": "CVE-2021-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3424" }, { "cve": "CVE-2021-34428", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-34428" }, { "cve": "CVE-2021-3449", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3449" }, { "cve": "CVE-2021-3450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3450" }, { "cve": "CVE-2021-3530", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3530" }, { "cve": "CVE-2021-36221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36221" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-3648", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3648" }, { "cve": "CVE-2021-36690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-36690" }, { "cve": "CVE-2021-3711", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3711" }, { "cve": "CVE-2021-3712", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3712" }, { "cve": "CVE-2021-37136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37136" }, { "cve": "CVE-2021-37137", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37137" }, { "cve": "CVE-2021-37404", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37404" }, { "cve": "CVE-2021-37533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-37533" }, { "cve": "CVE-2021-3754", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3754" }, { "cve": "CVE-2021-3778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3778" }, { "cve": "CVE-2021-3796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3796" }, { "cve": "CVE-2021-3826", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3826" }, { "cve": "CVE-2021-3827", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3827" }, { "cve": "CVE-2021-38297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-38297" }, { "cve": "CVE-2021-3872", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3872" }, { "cve": "CVE-2021-3875", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3875" }, { "cve": "CVE-2021-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3903" }, { "cve": "CVE-2021-3923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3923" }, { "cve": "CVE-2021-3927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3927" }, { "cve": "CVE-2021-3928", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3928" }, { "cve": "CVE-2021-3968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3968" }, { "cve": "CVE-2021-3973", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3973" }, { "cve": "CVE-2021-3974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3974" }, { "cve": "CVE-2021-3984", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-3984" }, { "cve": "CVE-2021-4019", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4019" }, { "cve": "CVE-2021-4037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4037" }, { "cve": "CVE-2021-4069", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4069" }, { "cve": "CVE-2021-4104", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4104" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-4157", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4157" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-41771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-41771" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4203", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-4203" }, { "cve": "CVE-2021-42567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-42567" }, { "cve": "CVE-2021-43797", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-43797" }, { "cve": "CVE-2021-44531", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44531" }, { "cve": "CVE-2021-44532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44532" }, { "cve": "CVE-2021-44533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44533" }, { "cve": "CVE-2021-44716", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44716" }, { "cve": "CVE-2021-44878", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-44878" }, { "cve": "CVE-2021-45078", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-45078" }, { "cve": "CVE-2021-46195", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46195" }, { "cve": "CVE-2021-46828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46828" }, { "cve": "CVE-2021-46848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2021-46848" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0128" }, { "cve": "CVE-2022-0213", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0213" }, { "cve": "CVE-2022-0225", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0225" }, { "cve": "CVE-2022-0261", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0261" }, { "cve": "CVE-2022-0318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0318" }, { "cve": "CVE-2022-0319", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0319" }, { "cve": "CVE-2022-0351", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0351" }, { "cve": "CVE-2022-0359", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0359" }, { "cve": "CVE-2022-0361", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0361" }, { "cve": "CVE-2022-0392", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0392" }, { "cve": "CVE-2022-0407", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0407" }, { "cve": "CVE-2022-0413", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0413" }, { "cve": "CVE-2022-0561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0561" }, { "cve": "CVE-2022-0696", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0696" }, { "cve": "CVE-2022-0778", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-0778" }, { "cve": "CVE-2022-1184", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1184" }, { "cve": "CVE-2022-1245", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1245" }, { "cve": "CVE-2022-1271", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1271" }, { "cve": "CVE-2022-1292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1292" }, { "cve": "CVE-2022-1381", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1381" }, { "cve": "CVE-2022-1420", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1420" }, { "cve": "CVE-2022-1462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1462" }, { "cve": "CVE-2022-1466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1466" }, { "cve": "CVE-2022-1471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1471" }, { "cve": "CVE-2022-1586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1586" }, { "cve": "CVE-2022-1587", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1587" }, { "cve": "CVE-2022-1616", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1616" }, { "cve": "CVE-2022-1619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1619" }, { "cve": "CVE-2022-1620", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1620" }, { "cve": "CVE-2022-1679", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1679" }, { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1720", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1720" }, { "cve": "CVE-2022-1729", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1729" }, { "cve": "CVE-2022-1733", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1733" }, { "cve": "CVE-2022-1735", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1735" }, { "cve": "CVE-2022-1771", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1771" }, { "cve": "CVE-2022-1785", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1785" }, { "cve": "CVE-2022-1796", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1796" }, { "cve": "CVE-2022-1851", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1851" }, { "cve": "CVE-2022-1897", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1897" }, { "cve": "CVE-2022-1898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1898" }, { "cve": "CVE-2022-1927", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1927" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-1968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1968" }, { "cve": "CVE-2022-1974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1974" }, { "cve": "CVE-2022-1975", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-1975" }, { "cve": "CVE-2022-20132", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20132" }, { "cve": "CVE-2022-20141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20141" }, { "cve": "CVE-2022-20154", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20154" }, { "cve": "CVE-2022-20166", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20166" }, { "cve": "CVE-2022-20368", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20368" }, { "cve": "CVE-2022-20369", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20369" }, { "cve": "CVE-2022-2047", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2047" }, { "cve": "CVE-2022-2048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2048" }, { "cve": "CVE-2022-20567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-20567" }, { "cve": "CVE-2022-2068", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2068" }, { "cve": "CVE-2022-2097", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2097" }, { "cve": "CVE-2022-21216", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21216" }, { "cve": "CVE-2022-21233", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21233" }, { "cve": "CVE-2022-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2124" }, { "cve": "CVE-2022-2125", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2125" }, { "cve": "CVE-2022-2126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2126" }, { "cve": "CVE-2022-2129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2129" }, { "cve": "CVE-2022-21363", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21363" }, { "cve": "CVE-2022-21385", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21385" }, { "cve": "CVE-2022-21499", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21499" }, { "cve": "CVE-2022-2153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2153" }, { "cve": "CVE-2022-21540", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21540" }, { "cve": "CVE-2022-21541", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21541" }, { "cve": "CVE-2022-21549", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21549" }, { "cve": "CVE-2022-21618", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21618" }, { "cve": "CVE-2022-21619", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21619" }, { "cve": "CVE-2022-21624", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21624" }, { "cve": "CVE-2022-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21626" }, { "cve": "CVE-2022-21628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21628" }, { "cve": "CVE-2022-21702", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-21702" }, { "cve": "CVE-2022-2175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2175" }, { "cve": "CVE-2022-2182", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2182" }, { "cve": "CVE-2022-2183", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2183" }, { "cve": "CVE-2022-2206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2206" }, { "cve": "CVE-2022-2207", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2207" }, { "cve": "CVE-2022-2208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2208" }, { "cve": "CVE-2022-2210", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2210" }, { "cve": "CVE-2022-2231", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2231" }, { "cve": "CVE-2022-2256", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2256" }, { "cve": "CVE-2022-2257", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2257" }, { "cve": "CVE-2022-2264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2264" }, { "cve": "CVE-2022-2284", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2284" }, { "cve": "CVE-2022-2285", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2285" }, { "cve": "CVE-2022-2286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2286" }, { "cve": "CVE-2022-2287", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2287" }, { "cve": "CVE-2022-22976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22976" }, { "cve": "CVE-2022-22978", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-22978" }, { "cve": "CVE-2022-2304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2304" }, { "cve": "CVE-2022-2318", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2318" }, { "cve": "CVE-2022-23302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23302" }, { "cve": "CVE-2022-23305", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23305" }, { "cve": "CVE-2022-23307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23307" }, { "cve": "CVE-2022-2343", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2343" }, { "cve": "CVE-2022-2344", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2344" }, { "cve": "CVE-2022-2345", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2345" }, { "cve": "CVE-2022-23471", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23471" }, { "cve": "CVE-2022-23521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23521" }, { "cve": "CVE-2022-23772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23772" }, { "cve": "CVE-2022-23773", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-23773" }, { "cve": "CVE-2022-24302", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24302" }, { "cve": "CVE-2022-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24329" }, { "cve": "CVE-2022-24823", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24823" }, { "cve": "CVE-2022-24903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-24903" }, { "cve": "CVE-2022-2503", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2503" }, { "cve": "CVE-2022-25147", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25147" }, { "cve": "CVE-2022-25168", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25168" }, { "cve": "CVE-2022-2519", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2519" }, { "cve": "CVE-2022-2520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2520" }, { "cve": "CVE-2022-2521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2521" }, { "cve": "CVE-2022-2522", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2522" }, { "cve": "CVE-2022-25647", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25647" }, { "cve": "CVE-2022-2571", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2571" }, { "cve": "CVE-2022-2580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2580" }, { "cve": "CVE-2022-2581", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2581" }, { "cve": "CVE-2022-25857", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-25857" }, { "cve": "CVE-2022-2588", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2588" }, { "cve": "CVE-2022-2598", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2598" }, { "cve": "CVE-2022-26148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26148" }, { "cve": "CVE-2022-26365", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26365" }, { "cve": "CVE-2022-26373", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26373" }, { "cve": "CVE-2022-2639", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2639" }, { "cve": "CVE-2022-26612", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-26612" }, { "cve": "CVE-2022-2663", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2663" }, { "cve": "CVE-2022-27781", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27781" }, { "cve": "CVE-2022-27782", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27782" }, { "cve": "CVE-2022-27943", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-27943" }, { "cve": "CVE-2022-2795", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2795" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-2816", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2816" }, { "cve": "CVE-2022-2817", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2817" }, { "cve": "CVE-2022-2819", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2819" }, { "cve": "CVE-2022-28327", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28327" }, { "cve": "CVE-2022-2845", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2845" }, { "cve": "CVE-2022-2849", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2849" }, { "cve": "CVE-2022-2862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2862" }, { "cve": "CVE-2022-2867", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2867" }, { "cve": "CVE-2022-2868", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2868" }, { "cve": "CVE-2022-2869", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2869" }, { "cve": "CVE-2022-28693", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28693" }, { "cve": "CVE-2022-2874", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2874" }, { "cve": "CVE-2022-28748", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-28748" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-2889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2889" }, { "cve": "CVE-2022-29162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29162" }, { "cve": "CVE-2022-29187", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29187" }, { "cve": "CVE-2022-2923", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2923" }, { "cve": "CVE-2022-2946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2946" }, { "cve": "CVE-2022-29526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29526" }, { "cve": "CVE-2022-29583", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29583" }, { "cve": "CVE-2022-2964", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2964" }, { "cve": "CVE-2022-2977", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2977" }, { "cve": "CVE-2022-2980", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2980" }, { "cve": "CVE-2022-2982", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2982" }, { "cve": "CVE-2022-29900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29900" }, { "cve": "CVE-2022-29901", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-29901" }, { "cve": "CVE-2022-2991", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-2991" }, { "cve": "CVE-2022-3016", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3016" }, { "cve": "CVE-2022-3028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3028" }, { "cve": "CVE-2022-3037", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3037" }, { "cve": "CVE-2022-30580", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30580" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-3099", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3099" }, { "cve": "CVE-2022-31030", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31030" }, { "cve": "CVE-2022-31159", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31159" }, { "cve": "CVE-2022-3134", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3134" }, { "cve": "CVE-2022-3153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3153" }, { "cve": "CVE-2022-3169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3169" }, { "cve": "CVE-2022-31690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-31690" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32206", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32206" }, { "cve": "CVE-2022-32208", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32208" }, { "cve": "CVE-2022-32221", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-32221" }, { "cve": "CVE-2022-3234", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3234" }, { "cve": "CVE-2022-3235", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3235" }, { "cve": "CVE-2022-3239", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3239" }, { "cve": "CVE-2022-3278", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3278" }, { "cve": "CVE-2022-3296", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3296" }, { "cve": "CVE-2022-3297", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3297" }, { "cve": "CVE-2022-33196", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33196" }, { "cve": "CVE-2022-3324", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3324" }, { "cve": "CVE-2022-3352", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3352" }, { "cve": "CVE-2022-33740", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33740" }, { "cve": "CVE-2022-33741", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33741" }, { "cve": "CVE-2022-33742", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33742" }, { "cve": "CVE-2022-33972", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33972" }, { "cve": "CVE-2022-33981", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-33981" }, { "cve": "CVE-2022-34169", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34169" }, { "cve": "CVE-2022-3424", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3424" }, { "cve": "CVE-2022-34266", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34266" }, { "cve": "CVE-2022-34526", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34526" }, { "cve": "CVE-2022-34903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-34903" }, { "cve": "CVE-2022-3491", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3491" }, { "cve": "CVE-2022-3515", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3515" }, { "cve": "CVE-2022-3520", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3520" }, { "cve": "CVE-2022-3521", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3521" }, { "cve": "CVE-2022-3524", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3524" }, { "cve": "CVE-2022-35252", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35252" }, { "cve": "CVE-2022-3542", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3542" }, { "cve": "CVE-2022-3545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3545" }, { "cve": "CVE-2022-3564", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3564" }, { "cve": "CVE-2022-3565", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3565" }, { "cve": "CVE-2022-3566", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3566" }, { "cve": "CVE-2022-3567", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3567" }, { "cve": "CVE-2022-35737", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-35737" }, { "cve": "CVE-2022-3586", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3586" }, { "cve": "CVE-2022-3591", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3591" }, { "cve": "CVE-2022-3594", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3594" }, { "cve": "CVE-2022-3597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3597" }, { "cve": "CVE-2022-3599", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3599" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-3621", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3621" }, { "cve": "CVE-2022-3626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3626" }, { "cve": "CVE-2022-3627", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3627" }, { "cve": "CVE-2022-3628", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3628" }, { "cve": "CVE-2022-36280", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36280" }, { "cve": "CVE-2022-3629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3629" }, { "cve": "CVE-2022-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3635" }, { "cve": "CVE-2022-3643", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3643" }, { "cve": "CVE-2022-36437", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36437" }, { "cve": "CVE-2022-3646", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3646" }, { "cve": "CVE-2022-3649", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3649" }, { "cve": "CVE-2022-36760", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36760" }, { "cve": "CVE-2022-36879", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36879" }, { "cve": "CVE-2022-36946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-36946" }, { "cve": "CVE-2022-3705", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3705" }, { "cve": "CVE-2022-37434", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37434" }, { "cve": "CVE-2022-37436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37436" }, { "cve": "CVE-2022-37865", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37865" }, { "cve": "CVE-2022-37866", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-37866" }, { "cve": "CVE-2022-38090", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38090" }, { "cve": "CVE-2022-38096", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38096" }, { "cve": "CVE-2022-38126", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38126" }, { "cve": "CVE-2022-38127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38127" }, { "cve": "CVE-2022-38177", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38177" }, { "cve": "CVE-2022-38178", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38178" }, { "cve": "CVE-2022-3821", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3821" }, { "cve": "CVE-2022-38533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38533" }, { "cve": "CVE-2022-38749", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38749" }, { "cve": "CVE-2022-38750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38750" }, { "cve": "CVE-2022-38751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38751" }, { "cve": "CVE-2022-38752", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-38752" }, { "cve": "CVE-2022-39028", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39028" }, { "cve": "CVE-2022-3903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3903" }, { "cve": "CVE-2022-39188", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39188" }, { "cve": "CVE-2022-39399", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-39399" }, { "cve": "CVE-2022-3970", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-3970" }, { "cve": "CVE-2022-40149", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40149" }, { "cve": "CVE-2022-40150", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40150" }, { "cve": "CVE-2022-40151", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40151" }, { "cve": "CVE-2022-40152", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40152" }, { "cve": "CVE-2022-40153", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40153" }, { "cve": "CVE-2022-40303", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40303" }, { "cve": "CVE-2022-40304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40304" }, { "cve": "CVE-2022-40307", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40307" }, { "cve": "CVE-2022-40674", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40674" }, { "cve": "CVE-2022-40768", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40768" }, { "cve": "CVE-2022-40899", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-40899" }, { "cve": "CVE-2022-4095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4095" }, { "cve": "CVE-2022-41218", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41218" }, { "cve": "CVE-2022-4129", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4129" }, { "cve": "CVE-2022-4141", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4141" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41717" }, { "cve": "CVE-2022-41721", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41721" }, { "cve": "CVE-2022-41848", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41848" }, { "cve": "CVE-2022-41850", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41850" }, { "cve": "CVE-2022-41854", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41854" }, { "cve": "CVE-2022-41858", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41858" }, { "cve": "CVE-2022-41881", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41881" }, { "cve": "CVE-2022-41903", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41903" }, { "cve": "CVE-2022-41915", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41915" }, { "cve": "CVE-2022-41966", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41966" }, { "cve": "CVE-2022-41974", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-41974" }, { "cve": "CVE-2022-42003", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42003" }, { "cve": "CVE-2022-42004", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42004" }, { "cve": "CVE-2022-42010", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42010" }, { "cve": "CVE-2022-42011", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42011" }, { "cve": "CVE-2022-42012", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42012" }, { "cve": "CVE-2022-42328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42328" }, { "cve": "CVE-2022-42329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42329" }, { "cve": "CVE-2022-42703", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42703" }, { "cve": "CVE-2022-42889", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42889" }, { "cve": "CVE-2022-42895", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42895" }, { "cve": "CVE-2022-42896", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42896" }, { "cve": "CVE-2022-42898", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42898" }, { "cve": "CVE-2022-4292", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4292" }, { "cve": "CVE-2022-4293", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4293" }, { "cve": "CVE-2022-42969", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-42969" }, { "cve": "CVE-2022-4304", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4304" }, { "cve": "CVE-2022-43552", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43552" }, { "cve": "CVE-2022-43680", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43680" }, { "cve": "CVE-2022-43750", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43750" }, { "cve": "CVE-2022-4378", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4378" }, { "cve": "CVE-2022-43945", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43945" }, { "cve": "CVE-2022-43995", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-43995" }, { "cve": "CVE-2022-4415", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4415" }, { "cve": "CVE-2022-4450", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4450" }, { "cve": "CVE-2022-44638", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-44638" }, { "cve": "CVE-2022-45061", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45061" }, { "cve": "CVE-2022-45688", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45688" }, { "cve": "CVE-2022-45884", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45884" }, { "cve": "CVE-2022-45885", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45885" }, { "cve": "CVE-2022-45886", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45886" }, { "cve": "CVE-2022-45887", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45887" }, { "cve": "CVE-2022-45919", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45919" }, { "cve": "CVE-2022-45934", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45934" }, { "cve": "CVE-2022-45939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-45939" }, { "cve": "CVE-2022-4662", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-4662" }, { "cve": "CVE-2022-46751", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46751" }, { "cve": "CVE-2022-46908", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-46908" }, { "cve": "CVE-2022-47629", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47629" }, { "cve": "CVE-2022-47929", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-47929" }, { "cve": "CVE-2022-48281", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48281" }, { "cve": "CVE-2022-48337", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48337" }, { "cve": "CVE-2022-48339", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2022-48339" }, { "cve": "CVE-2023-0045", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0045" }, { "cve": "CVE-2023-0049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0049" }, { "cve": "CVE-2023-0051", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0051" }, { "cve": "CVE-2023-0054", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0054" }, { "cve": "CVE-2023-0215", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0215" }, { "cve": "CVE-2023-0286", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0286" }, { "cve": "CVE-2023-0288", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0288" }, { "cve": "CVE-2023-0433", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0433" }, { "cve": "CVE-2023-0464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0464" }, { "cve": "CVE-2023-0465", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0465" }, { "cve": "CVE-2023-0466", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0466" }, { "cve": "CVE-2023-0512", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0512" }, { "cve": "CVE-2023-0590", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0590" }, { "cve": "CVE-2023-0597", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0597" }, { "cve": "CVE-2023-0833", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-0833" }, { "cve": "CVE-2023-1076", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1076" }, { "cve": "CVE-2023-1095", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1095" }, { "cve": "CVE-2023-1118", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1118" }, { "cve": "CVE-2023-1127", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1127" }, { "cve": "CVE-2023-1170", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1170" }, { "cve": "CVE-2023-1175", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1175" }, { "cve": "CVE-2023-1370", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1370" }, { "cve": "CVE-2023-1380", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1380" }, { "cve": "CVE-2023-1390", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1390" }, { "cve": "CVE-2023-1436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1436" }, { "cve": "CVE-2023-1513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1513" }, { "cve": "CVE-2023-1611", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1611" }, { "cve": "CVE-2023-1670", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1670" }, { "cve": "CVE-2023-1855", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1855" }, { "cve": "CVE-2023-1989", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1989" }, { "cve": "CVE-2023-1990", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1990" }, { "cve": "CVE-2023-1998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-1998" }, { "cve": "CVE-2023-20862", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-20862" }, { "cve": "CVE-2023-2124", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2124" }, { "cve": "CVE-2023-2162", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2162" }, { "cve": "CVE-2023-2176", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2176" }, { "cve": "CVE-2023-21830", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21830" }, { "cve": "CVE-2023-21835", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21835" }, { "cve": "CVE-2023-21843", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21843" }, { "cve": "CVE-2023-21930", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21930" }, { "cve": "CVE-2023-21937", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21937" }, { "cve": "CVE-2023-21938", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21938" }, { "cve": "CVE-2023-21939", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21939" }, { "cve": "CVE-2023-2194", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2194" }, { "cve": "CVE-2023-21954", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21954" }, { "cve": "CVE-2023-21967", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21967" }, { "cve": "CVE-2023-21968", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-21968" }, { "cve": "CVE-2023-22490", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22490" }, { "cve": "CVE-2023-2253", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2253" }, { "cve": "CVE-2023-22809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-22809" }, { "cve": "CVE-2023-23454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23454" }, { "cve": "CVE-2023-23455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23455" }, { "cve": "CVE-2023-23559", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23559" }, { "cve": "CVE-2023-23916", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23916" }, { "cve": "CVE-2023-23946", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-23946" }, { "cve": "CVE-2023-24329", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24329" }, { "cve": "CVE-2023-24532", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24532" }, { "cve": "CVE-2023-24534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24534" }, { "cve": "CVE-2023-2483", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2483" }, { "cve": "CVE-2023-24998", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-24998" }, { "cve": "CVE-2023-2513", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2513" }, { "cve": "CVE-2023-25193", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25193" }, { "cve": "CVE-2023-25652", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25652" }, { "cve": "CVE-2023-25690", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25690" }, { "cve": "CVE-2023-25809", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25809" }, { "cve": "CVE-2023-25815", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-25815" }, { "cve": "CVE-2023-26048", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26048" }, { "cve": "CVE-2023-26049", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26049" }, { "cve": "CVE-2023-2650", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2650" }, { "cve": "CVE-2023-26545", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26545" }, { "cve": "CVE-2023-26604", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-26604" }, { "cve": "CVE-2023-27533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27533" }, { "cve": "CVE-2023-27534", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27534" }, { "cve": "CVE-2023-27535", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27535" }, { "cve": "CVE-2023-27536", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27536" }, { "cve": "CVE-2023-27538", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27538" }, { "cve": "CVE-2023-27561", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-27561" }, { "cve": "CVE-2023-2828", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2828" }, { "cve": "CVE-2023-28320", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28320" }, { "cve": "CVE-2023-28321", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28321" }, { "cve": "CVE-2023-28322", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28322" }, { "cve": "CVE-2023-28328", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28328" }, { "cve": "CVE-2023-28464", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28464" }, { "cve": "CVE-2023-28486", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28486" }, { "cve": "CVE-2023-28487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28487" }, { "cve": "CVE-2023-28642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28642" }, { "cve": "CVE-2023-28772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28772" }, { "cve": "CVE-2023-28840", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28840" }, { "cve": "CVE-2023-28841", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28841" }, { "cve": "CVE-2023-28842", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-28842" }, { "cve": "CVE-2023-29007", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29007" }, { "cve": "CVE-2023-29383", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29383" }, { "cve": "CVE-2023-29402", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29402" }, { "cve": "CVE-2023-29406", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29406" }, { "cve": "CVE-2023-29409", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-29409" }, { "cve": "CVE-2023-2976", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-2976" }, { "cve": "CVE-2023-30630", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30630" }, { "cve": "CVE-2023-30772", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-30772" }, { "cve": "CVE-2023-31084", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31084" }, { "cve": "CVE-2023-3138", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3138" }, { "cve": "CVE-2023-31436", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31436" }, { "cve": "CVE-2023-31484", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-31484" }, { "cve": "CVE-2023-32269", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32269" }, { "cve": "CVE-2023-32697", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-32697" }, { "cve": "CVE-2023-33264", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-33264" }, { "cve": "CVE-2023-34034", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34034" }, { "cve": "CVE-2023-34035", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34035" }, { "cve": "CVE-2023-34453", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34453" }, { "cve": "CVE-2023-34454", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34454" }, { "cve": "CVE-2023-34455", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34455" }, { "cve": "CVE-2023-34462", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-34462" }, { "cve": "CVE-2023-35116", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-35116" }, { "cve": "CVE-2023-3635", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-3635" }, { "cve": "CVE-2023-36479", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-36479" }, { "cve": "CVE-2023-39533", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-39533" }, { "cve": "CVE-2023-40167", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40167" }, { "cve": "CVE-2023-40217", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-40217" }, { "cve": "CVE-2023-41105", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41105" }, { "cve": "CVE-2023-41900", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-41900" }, { "cve": "CVE-2023-43642", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43642" }, { "cve": "CVE-2023-43804", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-43804" }, { "cve": "CVE-2023-44487", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-44487" }, { "cve": "CVE-2023-45803", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2023-45803" }, { "cve": "CVE-2024-21626", "notes": [ { "category": "description", "text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T033919" ] }, "release_date": "2024-04-04T22:00:00.000+00:00", "title": "CVE-2024-21626" } ] }
wid-sec-w-2023-0318
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder angemeldeter Angreifer kann mehrere Schwachstellen in Red Hat Migration Toolkit for Containers ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0318 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0318.json" }, { "category": "self", "summary": "WID-SEC-2023-0318 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0318" }, { "category": "external", "summary": "RedHat Security Advisory vom 2023-02-08", "url": "https://access.redhat.com/errata/RHSA-2023:0693" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0632 vom 2023-02-15", "url": "https://access.redhat.com/errata/RHSA-2023:0632" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0728 vom 2023-02-17", "url": "https://access.redhat.com/errata/RHSA-2023:0728" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0769 vom 2023-02-21", "url": "https://access.redhat.com/errata/RHSA-2023:0769" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:0774 vom 2023-02-22", "url": "https://access.redhat.com/errata/RHSA-2023:0774" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2041 vom 2023-04-27", "url": "https://access.redhat.com/errata/RHSA-2023:2041" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:3645 vom 2023-06-16", "url": "https://access.redhat.com/errata/RHSA-2023:3645" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-0121 vom 2024-01-13", "url": "https://linux.oracle.com/errata/ELSA-2024-0121.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30", "url": "https://access.redhat.com/errata/RHSA-2023:5006" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22", "url": "https://access.redhat.com/errata/RHSA-2024:2988" } ], "source_lang": "en-US", "title": "Red Hat Migration Toolkit for Containers: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-05-21T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:43:17.931+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0318", "initial_release_date": "2023-02-08T23:00:00.000+00:00", "revision_history": [ { "date": "2023-02-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-20T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-02-21T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-04-26T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-06-15T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-01T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2024-01-14T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-05-21T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } }, { "category": "product_version", "name": "Container Platform 4.11", "product": { "name": "Red Hat OpenShift Container Platform 4.11", "product_id": "T025990", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.11" } } }, { "category": "product_version_range", "name": "Migration Toolkit for Containers \u003c1.7.7", "product": { "name": "Red Hat OpenShift Migration Toolkit for Containers \u003c1.7.7", "product_id": "T026206" } }, { "category": "product_version", "name": "Container Platform 4.12", "product": { "name": "Red Hat OpenShift Container Platform 4.12", "product_id": "T026435", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:container_platform_4.12" } } }, { "category": "product_version_range", "name": "Container Platform \u003c4.14.0", "product": { "name": "Red Hat OpenShift Container Platform \u003c4.14.0", "product_id": "T031839" } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-43138", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2021-43138" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-2879", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-2879" }, { "cve": "CVE-2022-2880", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-2880" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-32190" }, { "cve": "CVE-2022-41715", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-41715" }, { "cve": "CVE-2022-41717", "notes": [ { "category": "description", "text": "In Red Hat Migration Toolkit for Containers existieren mehrere Schwachstellen in den Komponenten \"async\" und \"golang\". Ein Angreifer kann dies ausnutzen, um seine Rechte zu erweitern, einen Denial of Service zu verursachen, Sicherheitsvorkehrungen zu umgehen und Informationen offenzulegen. Zur erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Benutzeraktion oder eine Anmeldung erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "T026206", "T026435", "T004914", "T025990", "T031839" ] }, "release_date": "2023-02-08T23:00:00.000+00:00", "title": "CVE-2022-41717" } ] }
wid-sec-w-2022-2134
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Spectrum Protect ist eine zentralisierte Backupl\u00f6sung f\u00fcr Systeme im Netzwerk.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift ausnutzen, um einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2134 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2134.json" }, { "category": "self", "summary": "WID-SEC-2022-2134 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2134" }, { "category": "external", "summary": "IBM Security Bulletin 7005589 vom 2023-06-21", "url": "https://www.ibm.com/support/pages/node/7005589" }, { "category": "external", "summary": "IBM Security Bulletin vom 2022-11-20", "url": "https://www.ibm.com/support/pages/node/6838883" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8626 vom 2022-11-29", "url": "https://access.redhat.com/errata/RHSA-2022:8626" }, { "category": "external", "summary": "IBM Security Bulletin 6847653 vom 2022-12-20", "url": "https://www.ibm.com/support/pages/node/6847653" }, { "category": "external", "summary": "IBM Security Bulletin 6847643 vom 2022-12-20", "url": "https://www.ibm.com/support/pages/node/6847643" } ], "source_lang": "en-US", "title": "IBM Spectrum Protect: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-20T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:38:41.956+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2134", "initial_release_date": "2022-11-20T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-20T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-20T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-06-20T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Spectrum Protect plus 10.1", "product": { "name": "IBM Spectrum Protect plus 10.1", "product_id": "T015895", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 10.1", "product": { "name": "IBM Spectrum Protect 10.1", "product_id": "T023657", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:10.1" } } }, { "category": "product_name", "name": "IBM Spectrum Protect \u003c plus 10.1.12.2", "product": { "name": "IBM Spectrum Protect \u003c plus 10.1.12.2", "product_id": "T025369", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:plus_10.1.12.2" } } }, { "category": "product_name", "name": "IBM Spectrum Protect 8.1.17", "product": { "name": "IBM Spectrum Protect 8.1.17", "product_id": "T025663", "product_identification_helper": { "cpe": "cpe:/a:ibm:spectrum_protect:8.1.17" } } } ], "category": "product_name", "name": "Spectrum Protect" } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-1705", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-1705" }, { "cve": "CVE-2022-1962", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-1962" }, { "cve": "CVE-2022-27664", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-27664" }, { "cve": "CVE-2022-28131", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-28131" }, { "cve": "CVE-2022-30630", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-30630" }, { "cve": "CVE-2022-30631", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-30631" }, { "cve": "CVE-2022-30632", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-30632" }, { "cve": "CVE-2022-30633", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-30633" }, { "cve": "CVE-2022-30635", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-30635" }, { "cve": "CVE-2022-32148", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-32148" }, { "cve": "CVE-2022-32149", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-32149" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-32189" }, { "cve": "CVE-2022-32190", "notes": [ { "category": "description", "text": "In IBM Spectrum Protect Plus Container Backup and Restore for Kubernetes and Red Hat OpenShift existieren mehrere Schwachstellen. Diese bestehen in der Golang Go Komponente und erm\u00f6glichen es einem entfernten anonymen Angreifer einen Cross site Scripting Angriff durchzuf\u00fchren, Informationen offenzulegen oder einen Denial of Service zu verursachen." } ], "product_status": { "known_affected": [ "67646", "T023657", "T025663", "T015895" ] }, "release_date": "2022-11-20T23:00:00.000+00:00", "title": "CVE-2022-32190" } ] }
gsd-2022-32149
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-32149", "description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "id": "GSD-2022-32149", "references": [ "https://access.redhat.com/errata/RHSA-2022:6882", "https://access.redhat.com/errata/RHSA-2022:7407", "https://access.redhat.com/errata/RHSA-2022:7434", "https://access.redhat.com/errata/RHSA-2022:7435", "https://www.suse.com/security/cve/CVE-2022-32149.html", "https://access.redhat.com/errata/RHSA-2023:0481", "https://access.redhat.com/errata/RHSA-2023:0692", "https://access.redhat.com/errata/RHSA-2023:0693", "https://access.redhat.com/errata/RHSA-2023:0795", "https://ubuntu.com/security/CVE-2022-32149", "https://access.redhat.com/errata/RHSA-2023:1042" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-32149" ], "details": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "id": "GSD-2022-32149", "modified": "2023-12-13T01:19:12.555721Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@golang.org", "ID": "CVE-2022-32149", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "golang.org/x/text/language", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "0", "version_value": "0.3.8" } ] } } ] }, "vendor_name": "golang.org/x/text" } ] } }, "credits": [ { "lang": "en", "value": "Adam Korczynski (ADA Logics)" }, { "lang": "en", "value": "OSS-Fuzz" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE 400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://go.dev/issue/56152", "refsource": "MISC", "url": "https://go.dev/issue/56152" }, { "name": "https://go.dev/cl/442235", "refsource": "MISC", "url": "https://go.dev/cl/442235" }, { "name": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ", "refsource": "MISC", "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "name": "https://pkg.go.dev/vuln/GO-2022-1059", "refsource": "MISC", "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "\u003c0.3.8", "affected_versions": "All versions before 0.3.8", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-772", "CWE-937" ], "date": "2022-10-18", "description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "fixed_versions": [ "0.3.8" ], "identifier": "CVE-2022-32149", "identifiers": [ "CVE-2022-32149" ], "not_impacted": "", "package_slug": "go/golang.org/x/text", "pubdate": "2022-10-14", "solution": "Upgrade to version 0.3.8 or above.", "title": "Missing Release of Resource after Effective Lifetime", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "https://go.dev/cl/442235", "https://go.dev/issue/56152", "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ", "https://pkg.go.dev/vuln/GO-2022-1059" ], "uuid": "ba6a6098-01f3-4fe6-919c-948ba7dba76e" }, { "affected_range": "\u003c0.3.8", "affected_versions": "All versions before 0.3.8", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-772", "CWE-937" ], "date": "2022-10-28", "description": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse.", "fixed_versions": [ "0.3.8" ], "identifier": "CVE-2022-32149", "identifiers": [ "GHSA-69ch-w2m2-3vjp", "CVE-2022-32149" ], "not_impacted": "All versions starting from 0.3.8", "package_slug": "go/golang.org/x/text/language", "pubdate": "2022-10-14", "solution": "Upgrade to version 0.3.8 or above.", "title": "Missing Release of Resource after Effective Lifetime", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2022-32149", "https://go.dev/cl/442235", "https://go.dev/issue/56152", "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ", "https://pkg.go.dev/vuln/GO-2022-1059", "https://github.com/golang/go/issues/56152", "https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c", "https://github.com/advisories/GHSA-69ch-w2m2-3vjp" ], "uuid": "556d58c2-53f7-49d2-8f5e-d69ea716db5c" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:golang:text:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.3.8", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@golang.org", "ID": "CVE-2022-32149" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An attacker may cause a denial of service by crafting an Accept-Language header which ParseAcceptLanguage will take significant time to parse." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-772" } ] } ] }, "references": { "reference_data": [ { "name": "https://go.dev/cl/442235", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://go.dev/cl/442235" }, { "name": "https://go.dev/issue/56152", "refsource": "MISC", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://go.dev/issue/56152" }, { "name": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ", "refsource": "MISC", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "name": "https://pkg.go.dev/vuln/GO-2022-1059", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-18T17:41Z", "publishedDate": "2022-10-14T15:15Z" } } }
ghsa-69ch-w2m2-3vjp
Vulnerability from github
The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.
Specific Go Packages Affected
golang.org/x/text/language
{ "affected": [ { "package": { "ecosystem": "Go", "name": "golang.org/x/text" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "0.3.8" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2022-32149" ], "database_specific": { "cwe_ids": [ "CWE-772" ], "github_reviewed": true, "github_reviewed_at": "2022-10-28T20:11:26Z", "nvd_published_at": "2022-10-14T15:15:00Z", "severity": "HIGH" }, "details": "The BCP 47 tag parser has quadratic time complexity due to inherent aspects of its design. Since the parser is, by design, exposed to untrusted user input, this can be leveraged to force a program to consume significant time parsing Accept-Language headers. The parser cannot be easily rewritten to fix this behavior for various reasons. Instead the solution implemented in this CL is to limit the total complexity of tags passed into ParseAcceptLanguage by limiting the number of dashes in the string to 1000. This should be more than enough for the majority of real world use cases, where the number of tags being sent is likely to be in the single digits.\n\n### Specific Go Packages Affected\ngolang.org/x/text/language", "id": "GHSA-69ch-w2m2-3vjp", "modified": "2024-05-20T21:36:16Z", "published": "2022-10-14T19:00:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32149" }, { "type": "WEB", "url": "https://github.com/golang/go/issues/56152" }, { "type": "WEB", "url": "https://github.com/golang/text/commit/434eadcdbc3b0256971992e8c70027278364c72c" }, { "type": "PACKAGE", "url": "https://github.com/golang/text" }, { "type": "WEB", "url": "https://go.dev/cl/442235" }, { "type": "WEB", "url": "https://go.dev/issue/56152" }, { "type": "WEB", "url": "https://groups.google.com/g/golang-announce/c/-hjNw559_tE/m/KlGTfid5CAAJ" }, { "type": "WEB", "url": "https://pkg.go.dev/vuln/GO-2022-1059" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": "golang.org/x/text/language Denial of service via crafted Accept-Language header" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.